Table of contents
A personalized rhythm click‐based authentication system
Ting‐Yi Chang, Yu‐Ju Yang, Chun‐Cheng PengIn keystroke‐based authentication systems, an input device to enter a password is needed. Users are verified by checking the validity of the password and typing characteristics…
Vulnerability analysis and the practical implications of a server‐challenge‐based one‐time password system
Seung S. Yang, Hongsik ChoiOne‐time password systems provide great strengths over conventional password systems: protection against over‐the‐shoulder, eavesdropping, replay, etc. The Grid Data Security…
Security guideline tool for home users based on international standards
Guillermo Horacio Ramirez Caceres, Yoshimi TeshigawaraThe level of security of home information systems can be described as their capacity to resist all the accidental or deliberate malicious activities based on the evaluation…
Assessing and improving authentication confidence management
Michael Pearce, Sherali Zeadally, Ray HuntThe purpose of this paper is to address some weaknesses in the handling of current multi‐factor authentication, suggests some criteria for overcoming these weaknesses and presents…