A survey on internet of things: Applications, recent issues, attacks, and security mechanisms
The Internet of Things (IoT) is a series of recording devices, mechanical and automated
machines, documents, creatures, or individuals that have one of the user identifiers and the …
machines, documents, creatures, or individuals that have one of the user identifiers and the …
Comprehensive survey: Biometric user authentication application, evaluation, and discussion
In this paper, we present a comprehensive review of the literature on biometric user
authentication, encompassing an analysis of key aspects such as the selection of biometric …
authentication, encompassing an analysis of key aspects such as the selection of biometric …
Attacks on the Industrial Internet of Things–Development of a multi-layer Taxonomy
S Berger, O Bürger, M Röglinger - Computers & Security, 2020 - Elsevier
Abstract The Industrial Internet of Things (IIoT) provides new opportunities to improve
process and production efficiency, which enable new business models. At the same time …
process and production efficiency, which enable new business models. At the same time …
Enhancing security and efficiency in cloud computing authentication and key agreement scheme based on smart card
The password-based authentication mechanism is considered as the oldest and the most
used method. It is easy to implement, and it does not require any particular configuration or …
used method. It is easy to implement, and it does not require any particular configuration or …
A security enhanced android unlock scheme based on pinch-to-zoom for smart devices
W Li, T Gleerup, J Tan, Y Wang - IEEE Transactions on …, 2023 - ieeexplore.ieee.org
With the rapid development of information technology, mobile phones especially
smartphones have become a basic and important personal device to assist and facilitate an …
smartphones have become a basic and important personal device to assist and facilitate an …
ZoomPass: A zoom-based android unlock scheme on smart devices
T Gleerup, W Li, J Tan, Y Wang - … Conference on Science of Cyber Security, 2022 - Springer
Modern smart devices such as smartphones are able to provide various services, including
checking online banking, watching video and listening to music. Due to the intelligence and …
checking online banking, watching video and listening to music. Due to the intelligence and …
A Graphical Password Scheme Based on Rounded Image Selection
X Qin, W Li - International Conference on Science of Cyber Security, 2023 - Springer
Graphical password is considered as an alternative to traditional textual password, but it
also faces many threats such as shoulder-surfing attack. To design and build a more secure …
also faces many threats such as shoulder-surfing attack. To design and build a more secure …
Check for A Graphical Password Scheme Based on Rounded Image Selection **nyuan Qin and Wenjuan Li (~) Department of Electronic and Information Engineering
X Qin, W Li - Science of Cyber Security: 5th International …, 2023 - books.google.com
Graphical password is considered as an alternative to traditional textual password, but it
also faces many threats such as shouldersurfing attack. To design and build a more secure …
also faces many threats such as shouldersurfing attack. To design and build a more secure …
Side channel attack
A Efe, KM Alashik - Gazi University Journal of Science Part A: Engineering … - dergipark.org.tr
Embedded frameworks remain continuously adopted in a varied range of application places.
Cryptography is the design besides analysis of calculated structures that enable …
Cryptography is the design besides analysis of calculated structures that enable …
SD‐SHO: Security‐dominated finite state machine state assignment technique with a satisfactory level of hardware optimization
N Das, AP Panchanathan - IET Computers & Digital …, 2021 - Wiley Online Library
Recently, the finite state machine (FSM)‐based digital controllers are susceptible to fault‐
injection and side‐channel attacks, which makes FSM security a more prominent factor. FSM …
injection and side‐channel attacks, which makes FSM security a more prominent factor. FSM …