Gotta captcha'em all: A survey of 20 years of the human-or-computer dilemma

M Guerar, L Verderame, M Migliardi… - ACM Computing …, 2021 - dl.acm.org
A recent study has found that malicious bots generated nearly a quarter of overall website
traffic in 2019 [102]. These malicious bots perform activities such as price and content …

Stay home! Conducting remote usability evaluations of novel real-world authentication systems using virtual reality

F Mathis, J O'hagan, K Vaniea, M Khamis - Proceedings of the 2022 …, 2022 - dl.acm.org
Evaluating interactive systems often requires researchers to invite user study participants to
the lab. However, corresponding evaluations often lack realism and participants are usually …

CirclePIN: A novel authentication mechanism for smartwatches to prevent unauthorized access to IoT devices

M Guerar, L Verderame, A Merlo, F Palmieri… - ACM Transactions on …, 2020 - dl.acm.org
In the last months, the market for personal wearable devices has been booming significantly,
and, in particular, smartwatches are starting to assume a fundamental role in the Bring Your …

Securing PIN‐based authentication in smartwatches with just two gestures

M Guerar, M Migliardi, F Palmieri… - Concurrency and …, 2020 - Wiley Online Library
Smartwatches are becoming increasingly ubiquitous as they offer new capabilities to
develop sophisticated applications that make daily life easier and more convenient for …

[HTML][HTML] SSI-MedRx: a fraud-resilient healthcare system based on blockchain and SSI

M Guerar, M Migliardi, E Russo, D Khadraoui… - Blockchain: Research …, 2024 - Elsevier
Today, healthcare fraud poses a significant issue, encompassing everything from falsified
billing claims and phantom services to the excessive prescription of opioid medications and …

The feet in human-centred security: Investigating foot-based user authentication for public displays

K Watson, R Bretin, M Khamis, F Mathis - CHI Conference on Human …, 2022 - dl.acm.org
A large body of work investigated touch, mid-air, and gaze-based user authentication.
However, little is known about authentication using other human body parts. In this paper …

2GesturePIN: Securing PIN-Based authentication on smartwatches

M Guerar, L Verderame, M Migliardi… - 2019 IEEE 28th …, 2019 - ieeexplore.ieee.org
Smartwatches offer new capabilities to develop sophisticated applications that make daily
life easier and more convenient for consumers and are becoming increasingly ubiquitous …

A new security solution enhancing the dynamic array pin protocol

S Chabbi, N El Madhoun - 2022 International Wireless …, 2022 - ieeexplore.ieee.org
In order to authenticate a user on an Automated Teller Machine (ATM) using Near Field
Communication (NFC) technology embedded on smartphones, we recently proposed a new …

Spinpad: a secured pin number based user authentication scheme

S Rajarajan, R Kalita, T Gayatri… - … on Recent Trends in …, 2018 - ieeexplore.ieee.org
Securing the smart phones against user authentication attacks has been a major concern for
the banks that offer mobile banking services. While the users enter their PIN numbers to get …

[PDF][PDF] Finding and Mitigating a Vulnerability of the Color Wheel PIN Protocol

S Chabbi, D Chefrour, N El Madhoun - International Journal of …, 2024 - mecs-press.org
There is an increasing usage in the banking sector of Smartphones enabled with Near Field
Communication (NFC), to improve the services offered for the customers. This usage …