Behavioral biometrics for continuous authentication in the internet-of-things era: An artificial intelligence perspective
In the Internet-of-Things (IoT) era, user authentication is essential to ensure the security of
connected devices and the customization of passive services. However, conventional …
connected devices and the customization of passive services. However, conventional …
A secure and cost-efficient offloading policy for mobile cloud computing against timing attacks
Abstract In Mobile Cloud Computing (MCC), offloading is a popular technique proposed to
augment the capabilities of mobile systems by mitigating complex computation to …
augment the capabilities of mobile systems by mitigating complex computation to …
Attribute-based pseudonymity for privacy-preserving authentication in cloud services
Attribute-based authentication is considered a cornerstone component to achieve scalable
fine-grained access control in the fast growing market of cloud-based services …
fine-grained access control in the fast growing market of cloud-based services …
Game-theoretical Model for Dynamic Defense Resource Allocation in Cyber-physical Power Systems Under Distributed Denial of Service Attacks
B Yan, P Yao, T Yang, B Zhou… - Journal of Modern Power …, 2023 - ieeexplore.ieee.org
Electric power grids are evolving into complex cyber-physical power systems (CPPSs) that
integrate advanced information and communication technologies (ICTs) but face increasing …
integrate advanced information and communication technologies (ICTs) but face increasing …
Machine learning assisted side-channel-attack countermeasure and its application on a 28-nm AES circuit
W Shan, S Zhang, J Xu, M Lu, L Shi… - IEEE Journal of Solid …, 2019 - ieeexplore.ieee.org
Hardware countermeasure of side channel attack (SCA) becomes necessary to protect
crypto circuits. Many countermeasures endured large area and power consumption. We …
crypto circuits. Many countermeasures endured large area and power consumption. We …
Towards identifying and preventing behavioral side channel attack on recording attack resilient unaided authentication services
Side channel attacks, based on the human behavior, have not received much attention in
the domain of recording attack resilient unaided authentication services (RARUAS) that …
the domain of recording attack resilient unaided authentication services (RARUAS) that …
MobSecure: A shoulder surfing safe login approach implemented on mobile device
Shoulder surfing attack is a great threat on password based authentication technique. As
today's world has seen a rapid growth of mobile users thus, latest methodologies which are …
today's world has seen a rapid growth of mobile users thus, latest methodologies which are …
A hybrid secure scheme for wireless sensor networks against timing attacks using continuous-time Markov chain and queueing model
Wireless sensor networks (WSNs) have recently gained popularity for a wide spectrum of
applications. Monitoring tasks can be performed in various environments. This may be …
applications. Monitoring tasks can be performed in various environments. This may be …
When eye-tracking meets cognitive modeling: applications to cyber security systems
Human cognitive modeling techniques and related software tools have been widely used by
researchers and practitioners to evaluate the effectiveness of user interface (UI) designs and …
researchers and practitioners to evaluate the effectiveness of user interface (UI) designs and …
On the linearization of human identification protocols: Attacks based on linear algebra, coding theory, and lattices
Human identification protocols are challenge-response protocols that rely on human
computational ability to reply to random challenges from the server based on a public …
computational ability to reply to random challenges from the server based on a public …