Turnitin
降AI改写
早检测系统
早降重系统
Turnitin-UK版
万方检测-期刊版
维普编辑部版
Grammarly检测
Paperpass检测
checkpass检测
PaperYY检测
An overview of the present and future of user authentication
MA Al Kabir, W Elmedany - 2022 4th IEEE Middle East and …, 2022 - ieeexplore.ieee.org
Cybersecurity is an ever-evolving discipline that aims to protect every aspect of an
information system, including its users, from digital threats, adversaries and attacks. When it …
information system, including its users, from digital threats, adversaries and attacks. When it …
Pump up password security! Evaluating and enhancing risk-based authentication on a real-world large-scale online service
S Wiefling, PR Jørgensen, S Thunem… - ACM Transactions on …, 2022 - dl.acm.org
Risk-based authentication (RBA) aims to protect users against attacks involving stolen
passwords. RBA monitors features during login, and requests re-authentication when …
passwords. RBA monitors features during login, and requests re-authentication when …
Account security interfaces: important, unintuitive, and untrustworthy
Online services increasingly rely on user-facing interfaces to communicate important
security-related account information—for example, which devices are logged into a user's …
security-related account information—for example, which devices are logged into a user's …
" As soon as it's a risk, I want to require {MFA"}: How Administrators Configure Risk-based Authentication
Risk-based authentication (RBA) complements standard password-based logins by using
knowledge about previously observed user behavior to prevent malicious login attempts …
knowledge about previously observed user behavior to prevent malicious login attempts …
SoK: Web Authentication in the Age of End-to-End Encryption
The advent of end-to-end encrypted (E2EE) messaging and backup services has brought
new challenges for usable authentication. Compared to regular web services, the nature of …
new challenges for usable authentication. Compared to regular web services, the nature of …
Evaluation of real-world risk-based authentication at online services revisited: complexity wins
JP Makowski, D Pöhn - … of the 18th International Conference on …, 2023 - dl.acm.org
Risk-based authentication (RBA) aims to protect end-users against attacks involving stolen
or otherwise guessed passwords without requiring a second authentication method all the …
or otherwise guessed passwords without requiring a second authentication method all the …
Risk-Based Authentication for OpenStack: A Fully Functional Implementation and Guiding Example
Online services have difficulties to replace passwords with more secure user authentication
mechanisms, such as Two-Factor Authentication (2FA). This is partly due to the fact that …
mechanisms, such as Two-Factor Authentication (2FA). This is partly due to the fact that …
F-RBA: A Federated Learning-based Framework for Risk-based Authentication
The proliferation of Internet services has led to an increasing need to protect private data.
User authentication serves as a crucial mechanism to ensure data security. Although robust …
User authentication serves as a crucial mechanism to ensure data security. Although robust …
A Privacy Measure Turned Upside Down? Investigating the Use of HTTP Client Hints on the Web
HTTP client hints are a set of standardized HTTP request headers designed to modernize
and potentially replace the traditional user agent string. While the user agent string exposes …
and potentially replace the traditional user agent string. While the user agent string exposes …
[PDF][PDF] Usability, security, and privacy of risk-based authentication
S Wiefling - 2023 - researchgate.net
Weaknesses in password-based authentication have always shaken password security,
especially with the rise of data breaches. Credential stuffing and password spraying attacks …
especially with the rise of data breaches. Credential stuffing and password spraying attacks …