Search
Now showing items 1-5 of 5
TaPIN: A Two-Factor User Authentication Scheme for Smartwatches through Secret Finger Tapping
(2020-05-11)
Nowadays, smartwatches have become one of the most common wearable gadgets as they are small and portable. As more and more personal information is managed and processed inside smartwatches, it is important to have a secure ...
User Syndication Using Speech Rhythm
(2019-08-08)
In recent years we have seen a variety of approaches to increase security on computers and mobile devices including fingerprint, and facial recognition. Such techniques while effective are very expensive. Voice biometrics, ...
"How Good are They?" - A State of the Effectiveness of Anti-Phishing Tools on Twitter
(2020-07-02)
Phishing websites are one of the most pervasive online attack vectors, with nearly 1.5 million such attacks created every month. Social media is the primary ground for phishing attacks, with 86% of these attacks originating ...
A Survey on DDoS Attacks in Edge Servers
(2020-12-09)
In modern times, the need for latency sensitive applications is growing rapidly. Cloud computing
infrastructure is unable to provide support to such delay sensitive applications. Therefore, a new
paradigm called edge ...
EMAuth: A USABLE CONTINUOUS AUTHENTICATION SCHEME
(2023-05-18)
**Please note that the full text is embargoed until 05/12/2025** ABSTRACT: In recent years, wearables have become an integral part of daily life for most
users. Wearables provide a seamless supplement to their main ...