Zobrazeno 1 - 10
of 4 757
pro vyhledávání: '"User authentication"'
Publikováno v:
Cybersecurity, Vol 7, Iss 1, Pp 1-14 (2024)
Abstract As mobile internet and Internet of Things technologies continue to advance, the application scenarios of peer-to-peer Internet of Drones (IoD) are becoming increasingly diverse. However, the development of IoD also faces significant challeng
Externí odkaz:
https://doaj.org/article/41a45b786db24c6f9bcfc4a1d013f3a4
Publikováno v:
Journal of Communications Software and Systems, Vol 20, Iss 2, Pp 186-197 (2024)
Recently, the numerous academic papers have been published on Authentication and Key Agreement (AKA) schemes for securing wireless sensor networks (WSN) in the context of the Internet of Things (IoT). The goal of these schemes is to protect external
Externí odkaz:
https://doaj.org/article/ec13cd2487504e0b96200d9e61dc72cd
Autor:
Andrii Astrakhantsev, Stanislav Pedan
Publikováno v:
Радіоелектронні і комп'ютерні системи, Vol 2024, Iss 2, Pp 173-185 (2024)
The recent development of mobile networks has led to the emergence of new threats and methods of implementing existing ones. Phishing attacks, including robocalls, are causing record losses to both individual users and large corporations. At the same
Externí odkaz:
https://doaj.org/article/582830812632402ab72b57300cb6360b
Publikováno v:
ARO-The Scientific Journal of Koya University, Vol 12, Iss 2 (2024)
In cyber security, the most crucial subject in information security is user authentication. Robust text-based password methods may offer a certain level of protection. Strong passwords are hard to remember, though, so people who use them frequently w
Externí odkaz:
https://doaj.org/article/8d2ec9c59ece4a11b1d04f4c5476da8e
Publikováno v:
Data in Brief, Vol 55, Iss , Pp 110697- (2024)
Identifying humans based on their behavioural patterns represents an attractive basis for access control as such patterns appear naturally, do not require a focused effort from the user side, and do not impose the additional burden of memorising pass
Externí odkaz:
https://doaj.org/article/0830739b3f234e2499afa29974be2fee
Autor:
Vesna Dimitrova, Elissa Mollakuqe
Publikováno v:
Open Research Europe, Vol 4 (2024)
Background This research delves into the critical aspects of identity management, access control, and authorization practices within the domains of public and private universities. Identity management involves the meticulous management and control of
Externí odkaz:
https://doaj.org/article/ba4fd5c92dcb4b8fa0a58ad06491d6c2
Autor:
Mahmoud G. Ismail, Mohammed A.-M. Salem, Mohamed A. Abd El Ghany, Eman Abdullah Aldakheel, Safia Abbas
Publikováno v:
PeerJ Computer Science, Vol 10, p e2086 (2024)
User authentication is a fundamental aspect of information security, requiring robust measures against identity fraud and data breaches. In the domain of keystroke dynamics research, a significant challenge lies in the reliance on imposter datasets,
Externí odkaz:
https://doaj.org/article/48377712a63f453ab3e5df75abfd6927
Autor:
Akram Al-Rumaim, Jyoti D. Pawar
Publikováno v:
IEEE Access, Vol 12, Pp 110850-110861 (2024)
In the evolving world of Cyber Attacks, this research presents an innovative approach aimed at fortifying user authentication within the Application Programming Interfaces (APIs) Ecosystem. We employ a groundbreaking synthesis of Context-Based finger
Externí odkaz:
https://doaj.org/article/e29aa12e45ee47cfbe887e0ed595f925
Publikováno v:
Journal of Engineering and Applied Science, Vol 71, Iss 1, Pp 1-23 (2024)
Abstract In the era of rapid technological advancement, the Internet of Things (IoT) has revolutionised healthcare through systems like the Telecare Medicine Information System (TMIS), designed to streamline patient-doctor interactions and enhance me
Externí odkaz:
https://doaj.org/article/71283f26994a4977869c7deaf2463ef7