Behavioral biometrics for continuous authentication in the internet-of-things era: An artificial intelligence perspective

Y Liang, S Samtani, B Guo, Z Yu - IEEE Internet of Things …, 2020 - ieeexplore.ieee.org
In the Internet-of-Things (IoT) era, user authentication is essential to ensure the security of
connected devices and the customization of passive services. However, conventional …

A secure and cost-efficient offloading policy for mobile cloud computing against timing attacks

T Meng, K Wolter, H Wu, Q Wang - Pervasive and Mobile Computing, 2018 - Elsevier
Abstract In Mobile Cloud Computing (MCC), offloading is a popular technique proposed to
augment the capabilities of mobile systems by mitigating complex computation to …

Attribute-based pseudonymity for privacy-preserving authentication in cloud services

V Sucasas, G Mantas, M Papaioannou… - IEEE Transactions on …, 2021 - ieeexplore.ieee.org
Attribute-based authentication is considered a cornerstone component to achieve scalable
fine-grained access control in the fast growing market of cloud-based services …

Game-theoretical Model for Dynamic Defense Resource Allocation in Cyber-physical Power Systems Under Distributed Denial of Service Attacks

B Yan, P Yao, T Yang, B Zhou… - Journal of Modern Power …, 2023 - ieeexplore.ieee.org
Electric power grids are evolving into complex cyber-physical power systems (CPPSs) that
integrate advanced information and communication technologies (ICTs) but face increasing …

Machine learning assisted side-channel-attack countermeasure and its application on a 28-nm AES circuit

W Shan, S Zhang, J Xu, M Lu, L Shi… - IEEE Journal of Solid …, 2019 - ieeexplore.ieee.org
Hardware countermeasure of side channel attack (SCA) becomes necessary to protect
crypto circuits. Many countermeasures endured large area and power consumption. We …

Towards identifying and preventing behavioral side channel attack on recording attack resilient unaided authentication services

N Chakraborty, VS Anand, S Mondal - Computers & Security, 2019 - Elsevier
Side channel attacks, based on the human behavior, have not received much attention in
the domain of recording attack resilient unaided authentication services (RARUAS) that …

MobSecure: A shoulder surfing safe login approach implemented on mobile device

N Chakraborty, GS Randhawa, K Das… - Procedia Computer …, 2016 - Elsevier
Shoulder surfing attack is a great threat on password based authentication technique. As
today's world has seen a rapid growth of mobile users thus, latest methodologies which are …

A hybrid secure scheme for wireless sensor networks against timing attacks using continuous-time Markov chain and queueing model

T Meng, X Li, S Zhang, Y Zhao - Sensors, 2016 - mdpi.com
Wireless sensor networks (WSNs) have recently gained popularity for a wide spectrum of
applications. Monitoring tasks can be performed in various environments. This may be …

When eye-tracking meets cognitive modeling: applications to cyber security systems

H Yuan, S Li, P Rusconi, N Aljaffan - … Conference, HAS 2017, Held as Part …, 2017 - Springer
Human cognitive modeling techniques and related software tools have been widely used by
researchers and practitioners to evaluate the effectiveness of user interface (UI) designs and …

On the linearization of human identification protocols: Attacks based on linear algebra, coding theory, and lattices

HJ Asghar, R Steinfeld, S Li, MA Kaafar… - IEEE Transactions on …, 2015 - ieeexplore.ieee.org
Human identification protocols are challenge-response protocols that rely on human
computational ability to reply to random challenges from the server based on a public …