Zobrazeno 1 - 9
of 9
pro vyhledávání: '"Jonathan Gurary"'
Autor:
Ye Zhu, Jonathan Gurary, George Corser, Jared Oluoch, Nahed Alnahash, Huirong Fu, Junhua Tang
Publikováno v:
IEEE Access, Vol 6, Pp 54795-54810 (2018)
It has long been recognized, by both security researchers and human-computer interaction researchers, that no silver bullet for authentication exists to achieve security, usability, and memorability. Aiming to achieve the goals, we propose a Multi-fA
Externí odkaz:
https://doaj.org/article/ae2f8852353843b2bf54f1c994169979
Publikováno v:
IEEE Transactions on Dependable and Secure Computing. 18:411-425
Smartphone reconnaissance, the first step to launch security attacks to a target smartphone, enables an adversary to tailor attacks by exploiting the known vulnerabilities of the target system. In this paper we investigate smartphone OS identificatio
Autor:
Huirong Fu, Jonathan Gurary, Jared Oluoch, Junhua Tang, Ye Zhu, Nahed A. Alnahash, George Corser
Publikováno v:
IEEE Access, Vol 6, Pp 54795-54810 (2018)
It has long been recognized, by both security researchers and human–computer interaction researchers, that no silver bullet for authentication exists to achieve security , usability , and memorability . Aiming to achieve the goals, we propose a Mul
Publikováno v:
International Journal of Communications, Network and System Sciences. 10:324-338
Devices with 3D capabilities are quickly gaining in popularity. In this paper, we propose to bring authentication into the third dimension. We define the concept of a 3D authentication scheme based on physical and psychological advantages of 3D. We i
Autor:
Gurary, Jonathan, Gurary
Mobile devices are ubiquitous in today's society, and the usage of these devices for secure tasks like corporate email, banking, and stock trading grows by the day. The first, and often only, defense against attackers who get physical access to the d
Autor:
Jonathan Gurary
Publikováno v:
Human-Computer Interaction. Theories, Methods, and Human Issues ISBN: 9783319912370
HCI (1)
HCI (1)
Authentication, particularly in the mobile environment, has still failed to capture many useful types of human mental ability. In this paper, we present the concept of analog authentication, an idea revolving around the use of continuously variable i
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::26c5e05b8a9019de9211916f76665d60
https://doi.org/10.1007/978-3-319-91238-7_42
https://doi.org/10.1007/978-3-319-91238-7_42
Publikováno v:
Digital Fingerprinting ISBN: 9781493965991
Digital Fingerprinting
Digital Fingerprinting
Operating system fingerprinting, helps IT administrators to perform vulnerability assessment and internal auditing in securing their networked systems. Meanwhile, it is, oftentimes, the first step to launch security attacks to a targeted system or se
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::9bde72236b151bf30ca36d4149927723
https://doi.org/10.1007/978-1-4939-6601-1_7
https://doi.org/10.1007/978-1-4939-6601-1_7
Publikováno v:
Lecture Notes in Computer Science ISBN: 9783319393803
HCI (20)
HCI (20)
An attacker that compromises the unlock mechanism of a mobile device can fundamentally use the device as if it were their own, with access to a large portion of the user’s sensitive data and communications. We propose a secondary implicit authentic
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::3023d99ab4c76a79ea2a0751506a5887
https://doi.org/10.1007/978-3-319-39381-0_3
https://doi.org/10.1007/978-3-319-39381-0_3
Publikováno v:
ITS
It has been long recognized that no silver bullet exists to achieve both security and memorability. With the addition of requirements, the task of designing authentication schemes for mobile devices becomes more challenging. We propose a Multi-dimens