State of the art: secure mobile payment

W Liu, X Wang, W Peng - IEEE Access, 2020 - ieeexplore.ieee.org
With mobile payments popular around the world, payers can conduct a payment anytime
and anywhere. While providing great convenience, mobile payment also brings many …

Multimodal biometric authentication: A review

S Pahuja, N Goel - AI Communications, 2024 - journals.sagepub.com
Critical applications ranging from sensitive military data to restricted area access demand
selective user authentication. The prevalent methods of tokens, passwords, and other …

Recent trends in user authentication–a survey

SW Shah, SS Kanhere - IEEE access, 2019 - ieeexplore.ieee.org
Recent advancements in technology have led to profusion of personal computing devices,
such as smart phone, tablet, watch, glasses, and many more. This has contributed to the …

True lies in geospatial big data: detecting location spoofing in social media

B Zhao, DZ Sui - Annals of GIS, 2017 - Taylor & Francis
Location spoofing refers to the act of intentionally falsifying one's actual locational
information. The proliferation of location spoofing in recent years has stirred debate about …

[HTML][HTML] Physical unclonable function and hashing are all you need to mutually authenticate iot devices

A Mostafa, SJ Lee, YK Peker - Sensors, 2020 - mdpi.com
Internet of Things (IoT) has become the driving force in modern day technology with an
increasing and rapid urge to create an intelligent, efficient, and connected world. IoT is used …

Authentication systems and methods using location matching

J Chitalia, A Ansari - US Patent 10,922,672, 2021 - Google Patents
According to some embodiments of the invention, an authentication method is provided.
Transaction data for a transaction is received at communication device from an access …

[HTML][HTML] Opportunistic Sensor-Based Authentication Factors in and for the Internet of Things

M Saideh, JP Jamont, L Vercouter - Sensors, 2024 - mdpi.com
Communication between connected objects in the Internet of Things (IoT) often requires
secure and reliable authentication mechanisms to verify identities of entities and prevent …

[HTML][HTML] Securing remote access to information systems of critical infrastructure using two-factor authentication

R Bruzgiene, K Jurgilas - Electronics, 2021 - mdpi.com
Information systems of critical infrastructure provide services on which the core functions of a
state and its economy depend as well as welfare of society. Such systems are becoming an …

An investigation of shoulder surfing attacks on touch-based unlock events

S Schneegass, A Saad, R Heger… - Proceedings of the …, 2022 - dl.acm.org
This paper contributes to our understanding of user-centered attacks on smartphones. In
particular, we investigate the likelihood of so-called shoulder surfing attacks during touch …

Anomaly detection for smartphone data streams

Y Mirsky, A Shabtai, B Shapira, Y Elovici… - Pervasive and Mobile …, 2017 - Elsevier
Smartphones centralize a great deal of users' private information and are thus a primary
target for cyber-attack. The main goal of the attacker is to try to access and exfiltrate the …