UniPass: design and evaluation of a smart device-based password manager for visually impaired users
Visually impaired users face various challenges in web authentication. We designed
UniPass, an accessible password manager for visually impaired users based on a smart …
UniPass, an accessible password manager for visually impaired users based on a smart …
Emulating U2F authenticator devices
F Reimair, C Kollmann… - 2016 IEEE Conference on …, 2016 - ieeexplore.ieee.org
Password authentication has been made more secure by adding additional factors.
Unfortunately, popular two-factor authentication methods are vulnerable to attacks …
Unfortunately, popular two-factor authentication methods are vulnerable to attacks …
A flexible authorization mechanism for enterprise networks using smart-phone devices
BC Chifor, S Teican, M Togan… - 2018 International …, 2018 - ieeexplore.ieee.org
The authentication and authorization process is a critical factor in Wi-Fi enterprise networks,
being the mechanism used to give access to the network resources. The general Wi-Fi …
being the mechanism used to give access to the network resources. The general Wi-Fi …
A secure and reliable architecture for user authentication through OTP in mobile payment system
The technological innovations in mobile payment systems have brought a revolutionary
change in the way online payments are carried out. The availability of robust and secure …
change in the way online payments are carried out. The availability of robust and secure …
Camera fingerprinting authentication revisited
D Maier, H Erb, P Mullan, V Haupert - 23rd International Symposium on …, 2020 - usenix.org
Authentication schemes that include smartphones gain popularity. Instead of storing keys in
app-private storage—clone-able by privileged malware—recent research proposes …
app-private storage—clone-able by privileged malware—recent research proposes …
Securing Web Inputs Using Parallel Session Attachments
Web applications have become a cornerstone of the critical cyber infrastructure powering
our daily life. Untrusted browser environments, such as public computers and browsers with …
our daily life. Untrusted browser environments, such as public computers and browsers with …
Efficient Cyber Security Operations with New Emerging Technologies
T Mitsunaga - Cyber Defense–Policies, Operations and …, 2019 - ebooks.iospress.nl
Threats posed by cyber attacks have been increasing year by year, and such security risks,
for most entities whether corporate, government or individuals, cannot be dismissed. There …
for most entities whether corporate, government or individuals, cannot be dismissed. There …
[PDF][PDF] A Smart-Phone Security Framework for Accessing Enterprise Wi-Fi Networks
S ŢEICAN, BC CHIFOR, M TOGAN… - Journal of Military …, 2018 - jmiltechnol.mta.ro
The authentication and authorization process is a critical factor in Wi-Fi enterprise networks,
being the mechanism used to give access to the network resources. The general Wi-Fi …
being the mechanism used to give access to the network resources. The general Wi-Fi …
JavaScript を用いたスマートフォン向け FIDO UAF Cloud の提案と評価
松本悦宜, 中川和弘, 渡辺孝信, 岡田満雄… - … シンポジウム 2018 論文 … - ipsj.ixsq.nii.ac.jp
論文抄録 **年, パスワードを用いないユーザ認証方式として FIDO が注目されている.
公開鍵方式を利用 した FIDO 仕様である FIDO UAF は, クライアントからサーバにパスワードを …
公開鍵方式を利用 した FIDO 仕様である FIDO UAF は, クライアントからサーバにパスワードを …
[PDF][PDF] The end of the password era: towards password-less authentication based on enhanced FIDO
M Bachl - 2016 - scholar.archive.org
Security incidents related to breached passwords are an omnipresent issue. Solutions for
security-critical applications like two-factor authentication exist, but are no option for …
security-critical applications like two-factor authentication exist, but are no option for …