A survey on internet of things: Applications, recent issues, attacks, and security mechanisms

G Uganya, Radhika, N Vijayaraj - Journal of Circuits, Systems and …, 2021 - World Scientific
The Internet of Things (IoT) is a series of recording devices, mechanical and automated
machines, documents, creatures, or individuals that have one of the user identifiers and the …

Comprehensive survey: Biometric user authentication application, evaluation, and discussion

R Alrawili, AAS AlQahtani, MK Khan - Computers and Electrical …, 2024 - Elsevier
In this paper, we present a comprehensive review of the literature on biometric user
authentication, encompassing an analysis of key aspects such as the selection of biometric …

Attacks on the Industrial Internet of Things–Development of a multi-layer Taxonomy

S Berger, O Bürger, M Röglinger - Computers & Security, 2020 - Elsevier
Abstract The Industrial Internet of Things (IIoT) provides new opportunities to improve
process and production efficiency, which enable new business models. At the same time …

Enhancing security and efficiency in cloud computing authentication and key agreement scheme based on smart card

M Bouchaala, C Ghazel, LA Saidane - The Journal of Supercomputing, 2022 - Springer
The password-based authentication mechanism is considered as the oldest and the most
used method. It is easy to implement, and it does not require any particular configuration or …

A security enhanced android unlock scheme based on pinch-to-zoom for smart devices

W Li, T Gleerup, J Tan, Y Wang - IEEE Transactions on …, 2023 - ieeexplore.ieee.org
With the rapid development of information technology, mobile phones especially
smartphones have become a basic and important personal device to assist and facilitate an …

ZoomPass: A zoom-based android unlock scheme on smart devices

T Gleerup, W Li, J Tan, Y Wang - … Conference on Science of Cyber Security, 2022 - Springer
Modern smart devices such as smartphones are able to provide various services, including
checking online banking, watching video and listening to music. Due to the intelligence and …

A Graphical Password Scheme Based on Rounded Image Selection

X Qin, W Li - International Conference on Science of Cyber Security, 2023 - Springer
Graphical password is considered as an alternative to traditional textual password, but it
also faces many threats such as shoulder-surfing attack. To design and build a more secure …

Check for A Graphical Password Scheme Based on Rounded Image Selection **nyuan Qin and Wenjuan Li (~) Department of Electronic and Information Engineering

X Qin, W Li - Science of Cyber Security: 5th International …, 2023 - books.google.com
Graphical password is considered as an alternative to traditional textual password, but it
also faces many threats such as shouldersurfing attack. To design and build a more secure …

Side channel attack

A Efe, KM Alashik - Gazi University Journal of Science Part A: Engineering … - dergipark.org.tr
Embedded frameworks remain continuously adopted in a varied range of application places.
Cryptography is the design besides analysis of calculated structures that enable …

SD‐SHO: Security‐dominated finite state machine state assignment technique with a satisfactory level of hardware optimization

N Das, AP Panchanathan - IET Computers & Digital …, 2021 - Wiley Online Library
Recently, the finite state machine (FSM)‐based digital controllers are susceptible to fault‐
injection and side‐channel attacks, which makes FSM security a more prominent factor. FSM …