Zero trust architecture (zta): A comprehensive survey

NF Syed, SW Shah, A Shaghaghi, A Anwar… - IEEE …, 2022 - ieeexplore.ieee.org
We present a detailed survey of the Zero Trust (ZT) security paradigm which has a growing
number of advocates in the critical infrastructure risk management space. The article …

A survey on human behavior recognition using channel state information

Z Wang, K Jiang, Y Hou, W Dou, C Zhang… - Ieee …, 2019 - ieeexplore.ieee.org
Recently, device-free human behavior recognition has become a hot research topic and has
achieved significant progress in the field of ubiquitous computing. Among various …

Recent trends in user authentication–a survey

SW Shah, SS Kanhere - IEEE access, 2019 - ieeexplore.ieee.org
Recent advancements in technology have led to profusion of personal computing devices,
such as smart phone, tablet, watch, glasses, and many more. This has contributed to the …

[HTML][HTML] Examining usable security features and user perceptions of Physical Authentication Devices

A Nanda, JJ Jeong, SWA Shah, M Nosouhi, R Doss - Computers & Security, 2024 - Elsevier
Despite the enhanced security benefits offered by Physical Authentication Devices (PADs)
compared to other forms of Multi-Factor Authentication (MFA), the adoption and retention of …

A survey of user authentication based on channel state information

Z Wang, W Dou, M Ma, X Feng, Z Huang… - Wireless …, 2021 - Wiley Online Library
Recently, human behavior sensing based on WiFi channel state information has drawn
more attention in the ubiquitous computing field because it can provide accurate information …

VID: Human identification through vein patterns captured from commodity depth cameras

SW Shah, SS Kanhere, J Zhang, L Yao - IET Biometrics, 2021 - Wiley Online Library
Herein, a human identification system for smart spaces called Vein‐ID (referred to as VID) is
presented, which leverage the uniqueness of vein patterns embedded in dorsum of an …

Single Person Identification Using Wi-Fi Signals

JCH Soto, I Galdino, E Caballero… - 2023 IEEE Latin …, 2023 - ieeexplore.ieee.org
Over time, identification devices and applications have evolved. However, they still require
people to perform certain actions to obtain their identification. Recently, Channel State …

Echo-ID: Smart user identification leveraging inaudible sound signals

SWA Shah, A Shaghaghi, SS Kanhere, J Zhang… - IEEE …, 2020 - ieeexplore.ieee.org
In this article, we present a novel user identification mechanism for smart spaces called
Echo-ID (referred to as E-ID). Our solution relies on inaudible sound signals for capturing the …

Evaluation of the adoption and privacy risks of google prompts

C Avraam, E Athanasopoulos - … , AIBlock, AIHWS, AIoTS, Cloud S&P, SCI …, 2020 - Springer
Internet services struggle with implementing better techniques for making authentication
easier for the end-user by balancing those traits without sacrificing their security or privacy …

Multi-Factor Continuous Authentication of Drivers Leveraging Smartphone

Y Song, F Jiang, SWA Shah… - 2023 IEEE Smart World …, 2023 - ieeexplore.ieee.org
The increased popularity and reliance of users upon car-sharing services necessitates
procedures that can continuously and accurately authenticate the drivers so that authorities …