Zero trust architecture (zta): A comprehensive survey
We present a detailed survey of the Zero Trust (ZT) security paradigm which has a growing
number of advocates in the critical infrastructure risk management space. The article …
number of advocates in the critical infrastructure risk management space. The article …
A survey on human behavior recognition using channel state information
Z Wang, K Jiang, Y Hou, W Dou, C Zhang… - Ieee …, 2019 - ieeexplore.ieee.org
Recently, device-free human behavior recognition has become a hot research topic and has
achieved significant progress in the field of ubiquitous computing. Among various …
achieved significant progress in the field of ubiquitous computing. Among various …
Recent trends in user authentication–a survey
Recent advancements in technology have led to profusion of personal computing devices,
such as smart phone, tablet, watch, glasses, and many more. This has contributed to the …
such as smart phone, tablet, watch, glasses, and many more. This has contributed to the …
[HTML][HTML] Examining usable security features and user perceptions of Physical Authentication Devices
Despite the enhanced security benefits offered by Physical Authentication Devices (PADs)
compared to other forms of Multi-Factor Authentication (MFA), the adoption and retention of …
compared to other forms of Multi-Factor Authentication (MFA), the adoption and retention of …
A survey of user authentication based on channel state information
Z Wang, W Dou, M Ma, X Feng, Z Huang… - Wireless …, 2021 - Wiley Online Library
Recently, human behavior sensing based on WiFi channel state information has drawn
more attention in the ubiquitous computing field because it can provide accurate information …
more attention in the ubiquitous computing field because it can provide accurate information …
VID: Human identification through vein patterns captured from commodity depth cameras
Herein, a human identification system for smart spaces called Vein‐ID (referred to as VID) is
presented, which leverage the uniqueness of vein patterns embedded in dorsum of an …
presented, which leverage the uniqueness of vein patterns embedded in dorsum of an …
Single Person Identification Using Wi-Fi Signals
Over time, identification devices and applications have evolved. However, they still require
people to perform certain actions to obtain their identification. Recently, Channel State …
people to perform certain actions to obtain their identification. Recently, Channel State …
Echo-ID: Smart user identification leveraging inaudible sound signals
In this article, we present a novel user identification mechanism for smart spaces called
Echo-ID (referred to as E-ID). Our solution relies on inaudible sound signals for capturing the …
Echo-ID (referred to as E-ID). Our solution relies on inaudible sound signals for capturing the …
Evaluation of the adoption and privacy risks of google prompts
Internet services struggle with implementing better techniques for making authentication
easier for the end-user by balancing those traits without sacrificing their security or privacy …
easier for the end-user by balancing those traits without sacrificing their security or privacy …
Multi-Factor Continuous Authentication of Drivers Leveraging Smartphone
The increased popularity and reliance of users upon car-sharing services necessitates
procedures that can continuously and accurately authenticate the drivers so that authorities …
procedures that can continuously and accurately authenticate the drivers so that authorities …