Authentication and authorization for mobile IoT devices using biofeatures: Recent advances and future trends
Biofeatures are fast becoming a key tool to authenticate the IoT devices; in this sense, the
purpose of this investigation is to summarise the factors that hinder biometrics models' …
purpose of this investigation is to summarise the factors that hinder biometrics models' …
Digital behavioral-fingerprint for user attribution in digital forensics: Are we there yet?
Abstract the need for a reliable and complementary identifier mechanism in a digital forensic
analysis is the focus of this study. Mouse dynamics have been applied in information …
analysis is the focus of this study. Mouse dynamics have been applied in information …
A study on continuous authentication using a combination of keystroke and mouse biometrics
In this paper we focus on a context independent continuous authentication system that
reacts on every separate action performed by a user. We contribute with a robust dynamic …
reacts on every separate action performed by a user. We contribute with a robust dynamic …
Trueheart: Continuous authentication on wrist-worn wearables using ppg-based biometrics
Traditional one-time user authentication processes might cause friction and unfavorable
user experience in many widely-used applications. This is a severe problem in particular for …
user experience in many widely-used applications. This is a severe problem in particular for …
Is this really you? An empirical study on risk-based authentication applied in the wild
Risk-based authentication (RBA) is an adaptive security measure to strengthen password-
based authentication. RBA monitors additional implicit features during password entry such …
based authentication. RBA monitors additional implicit features during password entry such …
Continuous user verification via respiratory biometrics
The ever-growing security issues in various mobile applications and smart devices create an
urgent demand for a reliable and convenient user verification method. Traditional verification …
urgent demand for a reliable and convenient user verification method. Traditional verification …
Combining keystroke and mouse dynamics for continuous user authentication and identification
In this paper, we analyze the performance of a continuous user authentication and
identification system for a PC under various analysis techniques. We applied a novel …
identification system for a PC under various analysis techniques. We applied a novel …
Continuous and transparent multimodal authentication: reviewing the state of the art
Individuals, businesses and governments undertake an ever-growing range of activities
online and via various Internet-enabled digital devices. Unfortunately, these activities …
online and via various Internet-enabled digital devices. Unfortunately, these activities …
Zero trust federation: Sharing context under user control towards zero trust in identity federation
K Hatakeyama, D Kotani… - 2021 IEEE International …, 2021 - ieeexplore.ieee.org
Perimeter models, which provide access control for protecting resources on networks, make
authorization decisions using the source network of access requests as one of critical …
authorization decisions using the source network of access requests as one of critical …
[HTML][HTML] Combining user behavioural information at the feature level to enhance continuous authentication systems
The scientific and business communities are proposing new authentication methods more
robust than traditional solutions relying on a single security point such as passwords (ie …
robust than traditional solutions relying on a single security point such as passwords (ie …