Abstract. With users being more reliant on online services for their daily activities, there is an increasing risk for them to be threatened by cyber-attacks harvesting their personal information or banking details. These attacks are often facilitated by the strong interconnectivity that exists between online accounts, in particular due to the presence of shared (e.g., replicated) pieces of user information across different accounts. In addition, a significant proportion of users employs pieces of information, e.g. used to recover access to an account, that are easily obtainable from their social networks accounts, and hence are vulnerable to correlation attacks, where a malicious attacker is either able to perform password reset attacks or...
Abstract—Recently, trustee-based social authentication, i.e., authenticating users with the help of ...
Although there have been many solutions applied, the safety challenges related to the password secur...
The growth in IoT will far exceed that of other connected devices. In contrast to the rapid assimila...
With users being more reliant on online services for their daily activities, there is an increasing ...
International audienceInternet users typically have several online accounts – such as mail accounts,...
Users experience a crisis of confidence for online activities in the current Internet. Unfortunately...
Internet users' digital identities consist of accounts for numerous services. These accounts can typ...
Password-based authentication is the dominant form of ac-cess control in web services. Unfortunately...
Password-based authentication is the dominant form of ac-cess control in web services. Unfortunately...
The increasing security breaches revealed in recent surveys and security threats reported in the med...
The growth of Online Social Networking (OSN) sites has created opportunities for consumers to commun...
Abstract — Recently, authenticating users with the help of their friends (i.e., trustee-based social...
Passwords are used for user authentication by almost every Internet service today, despite a number ...
A number of researchers have proposed various tools for checking security protocols. Most of these t...
There is increasing coverage in the literature highlighting threats to online financial systems. Att...
Abstract—Recently, trustee-based social authentication, i.e., authenticating users with the help of ...
Although there have been many solutions applied, the safety challenges related to the password secur...
The growth in IoT will far exceed that of other connected devices. In contrast to the rapid assimila...
With users being more reliant on online services for their daily activities, there is an increasing ...
International audienceInternet users typically have several online accounts – such as mail accounts,...
Users experience a crisis of confidence for online activities in the current Internet. Unfortunately...
Internet users' digital identities consist of accounts for numerous services. These accounts can typ...
Password-based authentication is the dominant form of ac-cess control in web services. Unfortunately...
Password-based authentication is the dominant form of ac-cess control in web services. Unfortunately...
The increasing security breaches revealed in recent surveys and security threats reported in the med...
The growth of Online Social Networking (OSN) sites has created opportunities for consumers to commun...
Abstract — Recently, authenticating users with the help of their friends (i.e., trustee-based social...
Passwords are used for user authentication by almost every Internet service today, despite a number ...
A number of researchers have proposed various tools for checking security protocols. Most of these t...
There is increasing coverage in the literature highlighting threats to online financial systems. Att...
Abstract—Recently, trustee-based social authentication, i.e., authenticating users with the help of ...
Although there have been many solutions applied, the safety challenges related to the password secur...
The growth in IoT will far exceed that of other connected devices. In contrast to the rapid assimila...