Turnitin
降AI改写
早检测系统
早降重系统
Turnitin-UK版
万方检测-期刊版
维普编辑部版
Grammarly检测
Paperpass检测
checkpass检测
PaperYY检测
RLAuth: A risk-based authentication system using reinforcement learning
C Picard, S Pierre - IEEE Access, 2023 - ieeexplore.ieee.org
Conventional authentication systems, that are used to protect most modern mobile
applications, are faced with usability and security problems related to their static and one …
applications, are faced with usability and security problems related to their static and one …
SoK: Web Authentication in the Age of End-to-End Encryption
The advent of end-to-end encrypted (E2EE) messaging and backup services has brought
new challenges for usable authentication. Compared to regular web services, the nature of …
new challenges for usable authentication. Compared to regular web services, the nature of …
A framework for analyzing authentication risks in account networks
Our everyday life depends more and more on online services and, therefore, access to
related user accounts. The security of user accounts, again, is tied to the security of the …
related user accounts. The security of user accounts, again, is tied to the security of the …
Towards an improved taxonomy of attacks related to digital identities and identity management systems
Digital transformation with the adoption of cloud technologies, outsourcing, and working‐
from‐home possibilities permits flexibility for organizations and persons. At the same time, it …
from‐home possibilities permits flexibility for organizations and persons. At the same time, it …
A new digital signature primitive and its application in blockchain
X Zou, P Zeng - IEEE Access, 2023 - ieeexplore.ieee.org
In this paper, we propose a new digital signature primitive, called expander signature, and
discuss its application in blockchain. The most promising advantage of expander signature …
discuss its application in blockchain. The most promising advantage of expander signature …
A user study of keystroke dynamics as second factor in web MFA
As account compromises and malicious online attacks are on the rise, multi-factor
authentication (MFA) has been adopted to defend against these attacks. OTP and mobile …
authentication (MFA) has been adopted to defend against these attacks. OTP and mobile …
Detecting Risky Authentication Using the OpenID Connect Token Exchange Time
With the rise in sophisticated cyber threats, traditional authentication methods are no longer
sufficient. Risk-based authentication (RBA) plays a critical role in the context of the zero trust …
sufficient. Risk-based authentication (RBA) plays a critical role in the context of the zero trust …
Evaluation of real-world risk-based authentication at online services revisited: complexity wins
JP Makowski, D Pöhn - … of the 18th International Conference on …, 2023 - dl.acm.org
Risk-based authentication (RBA) aims to protect end-users against attacks involving stolen
or otherwise guessed passwords without requiring a second authentication method all the …
or otherwise guessed passwords without requiring a second authentication method all the …
AI-URG: Account Identity-Based Uncertain Graph Framework for Fraud Detection
Cybercriminals controlling multiple accounts to conduct malicious activities are a threat to
the security of online services. These accounts form malicious communities that are difficult …
the security of online services. These accounts form malicious communities that are difficult …
Risk-Based Authentication for OpenStack: A Fully Functional Implementation and Guiding Example
Online services have difficulties to replace passwords with more secure user authentication
mechanisms, such as Two-Factor Authentication (2FA). This is partly due to the fact that …
mechanisms, such as Two-Factor Authentication (2FA). This is partly due to the fact that …