A Survey on Standards for Interoperability and Security in the Internet of Things

E Lee, YD Seo, SR Oh, YG Kim - … Communications Surveys & …, 2021 - ieeexplore.ieee.org
Recently, there has been an increase in studies relating to the Internet of Things (IoT) in
various fields, such as smart cities, smart homes, smart factories, and healthcare. In an IoT …

Continuous multimodal biometric authentication schemes: a systematic review

R Ryu, S Yeom, SH Kim, D Herbert - IEEE Access, 2021 - ieeexplore.ieee.org
Building safeguards against illegitimate access and authentication is a cornerstone for
securing systems. Existing user authentication schemes suffer from challenges in detecting …

Institutional strategies for cybersecurity in higher education institutions

ECK Cheng, T Wang - Information, 2022 - mdpi.com
Cybersecurity threats have grown exponentially, posing a heavy burden on organisations.
Higher Education Institutions (HEIs) are particularly vulnerable, and their cybersecurity …

[HTML][HTML] The design and evaluation of adaptive biometric authentication systems: Current status, challenges and future direction

R Ryu, S Yeom, D Herbert, J Dermoudy - ICT Express, 2023 - Elsevier
Biometric authentication systems may suffer from decreasing recognition performance due
to varying environmental conditions and sample ageing, which cause intra-class variability …

" I don't see why I would ever want to use it" Analyzing the Usability of Popular Smartphone Password Managers

S Seiler-Hwang, P Arias-Cabarcos, A Marín… - Proceedings of the …, 2019 - dl.acm.org
Passwords are an often unavoidable authentication mechanism, despite the availability of
additional alternative means. In the case of smartphones, usability problems are aggravated …

On understanding context modelling for adaptive authentication systems

A Bumiller, S Challita, B Combemale, O Barais… - ACM Transactions on …, 2023 - dl.acm.org
In many situations, it is of interest for authentication systems to adapt to context (eg, when
the user's behavior differs from the previous behavior). Hence, representing the context with …

RLAuth: A risk-based authentication system using reinforcement learning

C Picard, S Pierre - IEEE Access, 2023 - ieeexplore.ieee.org
Conventional authentication systems, that are used to protect most modern mobile
applications, are faced with usability and security problems related to their static and one …

A comprehensive survey of context-aware continuous implicit authentication in online learning environments

R Ryu, S Yeom, D Herbert, J Dermoudy - IEEE Access, 2023 - ieeexplore.ieee.org
User authentication is crucial in the digital learning environment to preserve the integrity and
reliability of the learning process. Implicit authentication using biometrics has been …

The catcher in the eye: Recognizing users by their blinks

R Iijima, T Takehisa, T Ohki, T Mori - Proceedings of the 19th ACM Asia …, 2024 - dl.acm.org
In this paper, we develop a novel behavioral biometric recognition framework, BlinkAuth,
that takes advantage of a user's blinking. BlinkAuth utilizes electrooculogram (EOG) data,(ie …

Authentication mechanisms and classification: A literature survey

I Chenchev, A Aleksieva-Petrova, M Petrov - … Computing: Proceedings of …, 2021 - Springer
The Security must be considered from the need of two nodes to communicate with each
other, through the moment of confirmed authentication to the secured establishment. It is an …