UniPass: design and evaluation of a smart device-based password manager for visually impaired users

NM Barbosa, J Hayes, Y Wang - … of the 2016 ACM international joint …, 2016 - dl.acm.org
Visually impaired users face various challenges in web authentication. We designed
UniPass, an accessible password manager for visually impaired users based on a smart …

Emulating U2F authenticator devices

F Reimair, C Kollmann… - 2016 IEEE Conference on …, 2016 - ieeexplore.ieee.org
Password authentication has been made more secure by adding additional factors.
Unfortunately, popular two-factor authentication methods are vulnerable to attacks …

A flexible authorization mechanism for enterprise networks using smart-phone devices

BC Chifor, S Teican, M Togan… - 2018 International …, 2018 - ieeexplore.ieee.org
The authentication and authorization process is a critical factor in Wi-Fi enterprise networks,
being the mechanism used to give access to the network resources. The general Wi-Fi …

A secure and reliable architecture for user authentication through OTP in mobile payment system

D Dhamija, A Dhamija - Proceedings of the International Conference on …, 2022 - Springer
The technological innovations in mobile payment systems have brought a revolutionary
change in the way online payments are carried out. The availability of robust and secure …

Camera fingerprinting authentication revisited

D Maier, H Erb, P Mullan, V Haupert - 23rd International Symposium on …, 2020 - usenix.org
Authentication schemes that include smartphones gain popularity. Instead of storing keys in
app-private storage—clone-able by privileged malware—recent research proposes …

Securing Web Inputs Using Parallel Session Attachments

Z Yang, R Xu, Q Lin, S Wu, J Mao, Z Liang - International Conference on …, 2023 - Springer
Web applications have become a cornerstone of the critical cyber infrastructure powering
our daily life. Untrusted browser environments, such as public computers and browsers with …

Efficient Cyber Security Operations with New Emerging Technologies

T Mitsunaga - Cyber Defense–Policies, Operations and …, 2019 - ebooks.iospress.nl
Threats posed by cyber attacks have been increasing year by year, and such security risks,
for most entities whether corporate, government or individuals, cannot be dismissed. There …

[PDF][PDF] A Smart-Phone Security Framework for Accessing Enterprise Wi-Fi Networks

S ŢEICAN, BC CHIFOR, M TOGAN… - Journal of Military …, 2018 - jmiltechnol.mta.ro
The authentication and authorization process is a critical factor in Wi-Fi enterprise networks,
being the mechanism used to give access to the network resources. The general Wi-Fi …

JavaScript を用いたスマートフォン向け FIDO UAF Cloud の提案と評価

松本悦宜, 中川和弘, 渡辺孝信, 岡田満雄… - … シンポジウム 2018 論文 … - ipsj.ixsq.nii.ac.jp
論文抄録 **年, パスワードを用いないユーザ認証方式として FIDO が注目されている.
公開鍵方式を利用 した FIDO 仕様である FIDO UAF は, クライアントからサーバにパスワードを …

[PDF][PDF] The end of the password era: towards password-less authentication based on enhanced FIDO

M Bachl - 2016 - scholar.archive.org
Security incidents related to breached passwords are an omnipresent issue. Solutions for
security-critical applications like two-factor authentication exist, but are no option for …