Cryptanalysis of a Honeyword System in the IoT Platform | 0 | 0.34 | 2022 |
RTT-Based Rogue UAV Detection in IoV Networks | 0 | 0.34 | 2022 |
On Designing a Lesser Obtrusive Authentication Protocol to Prevent Machine-Learning-Based Threats in Internet of Things | 0 | 0.34 | 2021 |
On Designing An Unaided Authentication Service With Threat Detection And Leakage Control For Defeating Opportunistic Adversaries | 0 | 0.34 | 2021 |
On Understanding the Impact of RTT in the Mobile Network for Detecting the Rogue UAVs | 0 | 0.34 | 2020 |
Towards identifying and preventing behavioral side channel attack on recording attack resilient unaided authentication services | 1 | 0.35 | 2019 |
On Overcoming The Identified Limitations Of A Usable Pin Entry Method | 0 | 0.34 | 2019 |
Towards incorporating honeywords in n-session recording attack resilient unaided authentication services. | 0 | 0.34 | 2019 |
On Designing a Questionnaire Based Honeyword Generation Approach for Achieving Flatness | 0 | 0.34 | 2018 |
On designing a modified-UI based honeyword generation approach for overcoming the existing limitations. | 2 | 0.41 | 2017 |
On Designing A Questionnaire Based Legacy-UI Honeyword Generation Approach For Achieving Flatness. | 0 | 0.34 | 2017 |
Lighting Two Candles With One Flame: An Unaided Human Identification Protocol With Security Beyond Conventional Limit. | 0 | 0.34 | 2017 |
On The Limitation of Some Fully Observable Multiple Session Resilient Shoulder Surfing Defense Mechanisms. | 0 | 0.34 | 2017 |
The Tale of Sansa Spark. | 1 | 0.36 | 2017 |
Distributed Semantic Analytics Using the SANSA Stack. | 11 | 0.86 | 2017 |
On Designing Leakage-Resilient Vibration Based Authentication Techniques | 0 | 0.34 | 2016 |
A New Storage Optimized Honeyword Generation Approach for Enhancing Security and Usability. | 0 | 0.34 | 2015 |
Few notes towards making honeyword system more secure and usable | 1 | 0.35 | 2015 |
HoneyString: an improved methodology over tag digit-based honeypot to detect shoulder surfing attack. | 0 | 0.34 | 2015 |
SLASS: Secure Login against Shoulder Surfing. | 2 | 0.46 | 2014 |
I-SLASS: an improved login approach over SLASS | 0 | 0.34 | 2014 |
Tag Digit Based Honeypot to Detect Shoulder Surfing Attack. | 4 | 0.46 | 2014 |