Adversary models for mobile device authentication

R Mayrhofer, S Sigg - ACM Computing Surveys (CSUR), 2021 - dl.acm.org
Mobile device authentication has been a highly active research topic for over 10 years, with
a vast range of methods proposed and analyzed. In related areas, such as secure channel …

A new risk-based authentication management model oriented on user's experience

M Sepczuk, Z Kotulski - Computers & Security, 2018 - Elsevier
With the increasing role of numerous Internet services, more and more private data must be
protected. One of the mechanisms which is used to ensure data security is user …

Applying biclustering to perform collaborative filtering

PAD de Castro, FO de Franca… - … Systems Design and …, 2007 - ieeexplore.ieee.org
Collaborative filtering (CF) is a method to perform automated suggestions for a user based
on the opinion of other users with similar interest. Most of the CF algorithms do not take into …

Adaptive secure multicast in wireless networks

Y Han, X Gui - International Journal of Communication Systems, 2009 - Wiley Online Library
Secure multicast is one of the majority services in the near future. The frameworks for IP
multicast cannot be directly applied in wireless networks. To address the natural issues of …

QoP-ML: Quality of Protection modelling language for cryptographic protocols

B Ksiezopolski - Computers & Security, 2012 - Elsevier
Cryptographic protocols can be realized on different levels of security. One can choose
factors which have different impact on the overall system security. Traditionally, protocols …

Resource optimization techniques and security levels for wireless sensor networks based on the ARSy framework

JM Parenreng, A Kitagawa - Sensors, 2018 - mdpi.com
Wireless Sensor Networks (WSNs) with limited battery, central processing units (CPUs), and
memory resources are a widely implemented technology for early warning detection …

CMAC, CCM and GCM/GMAC: Advanced modes of operation of symmetric block ciphers in wireless sensor networks

P Szalachowski, B Ksiezopolski, Z Kotulski - Information Processing Letters, 2010 - Elsevier
Symmetric block ciphers are usually used in WSN for security services. This paper puts
forward the idea of using advanced modes of operation of symmetric block ciphers to …

Kee** Verticals' Sovereignty During Application Migration in Continuum

Z Kotulski, T Nowak, M Sepczuk, K Bocianiak… - Journal of Network and …, 2024 - Springer
Competing service providers in the cloud environment ensure services are delivered under
the promised security requirements. It is crucial for mobile services where user's movement …

ECC-based biometric signature: A new approach in electronic banking security

S Mohammadi, S Abedi - 2008 International Symposium on …, 2008 - ieeexplore.ieee.org
Internet banking is the provision of banking services over the internet that gives people the
opportunity of easy access to their banking activities. This paper focuses on the security of …

A conceptual model of security context

V Jovanovikj, D Gabrijelčič, T Klobučar - International Journal of …, 2014 - Springer
Ubiquitous environments which embrace the trends of enterprise mobility and the
consumerization of IT have an increasing social importance. In these environments, the …