Despite the astronomical growth of smartphones and tablets, and the rise in applications allowing consumers to purchase both virtual and real goods from their mobile devices, mobile commerce still ...
Are passwords passé? A couple of weeks ago, the “Seattle Post-Intelligencer” ran an Associated Press story that described various multi-factor authentication schemes, such as password-plus-biometric ...
A published study on picture-gesture authentication demonstrates weak points hackers could expose in guessing picture-based passwords. Typing on a smartphone or tablet keyboard lends itself to a lot ...
I’m still on my quest to find good user authentication techniques that can supplement or replace the old username and password scheme. In this age of spoofing, phishing and stolen IDs, we need strong ...
Of all the things which are annoying about the modern World Wide Web, the need to create and remember countless passwords is on the top of most people’s lists. From dozens of passwords for everything ...
The authors evaluate two decades of proposals to replace text passwords for general-purpose user authentication on the web using a broad set of twenty-five usability, deploy ability and security ...
Unlock the full InfoQ experience by logging in! Stay updated with your favorite authors and topics, engage with content, and download exclusive resources. Vivek Yadav, an engineering manager from ...
In this paper, the authors propose time synchronized one-time-password scheme to provide secure wake up authentication. The main constraint of wireless sensor networks is their limited power resource ...