|
|
|
AlsharifHasan Mohamad Aburbeian and Manuel Fernández-Veiga
Securing online financial transactions has become a critical concern in an era where financial services are becoming more and more digital. The transition to digital platforms for conducting daily transactions exposed customers to possible risks from cyb...
ver más
|
|
|
|
|
|
|
Soumya Prakash Otta, Subhrakanta Panda, Maanak Gupta and Chittaranjan Hota
The unauthorized usage of various services and resources in cloud computing is something that must be protected against. Authentication and access control are the most significant concerns in cloud computing. Several researchers in this field suggest num...
ver más
|
|
|
|
|
|
|
Vassilis Papaspirou, Maria Papathanasaki, Leandros Maglaras, Ioanna Kantzavelou, Christos Douligeris, Mohamed Amine Ferrag and Helge Janicke
Despite the rapid development of technology, computer systems still rely heavily on passwords for security, which can be problematic. Although multi-factor authentication has been introduced, it is not completely effective against more advanced attacks. ...
ver más
|
|
|
|
|
|
|
Ioanna Anastasaki, George Drosatos, George Pavlidis and Konstantinos Rantos
Immersive technologies are revolutionary technological advancements that offer users unparalleled experiences of immersion in a virtual or mixed world of virtual and real elements. In such technology, user privacy, security, and anonymity are paramount, ...
ver más
|
|
|
|
|
|
|
Bochuan Hou, Yang Xin, Hongliang Zhu, Yixian Yang and Jianhua Yang
Vehicle ad-hoc network (VANET) is interconnected through message forwarding and exchanging among vehicle nodes. Due to its highly dynamic topology and its wireless and heterogeneous communication mode, VANET is more vulnerable to security threats from mu...
ver más
|
|
|
|
|
|
|
Guma Ali, Mussa Ally Dida and Anael Elikana Sam
With the expansion of smartphone and financial technologies (FinTech), mobile money emerged to improve financial inclusion in many developing nations. The majority of the mobile money schemes used in these nations implement two-factor authentication (2FA...
ver más
|
|
|
|
|
|
|
Stefan A. Aebersold, Mobayode O. Akinsolu, Shafiul Monir and Martyn L. Jones
In this paper, an integrated system to control and manage a state-of-the-art industrial computer numerical control (CNC) machine (Studer S33) using a commercially available tablet (Samsung Galaxy Tablet S2) is presented as a proof of concept (PoC) for th...
ver más
|
|
|
|