Now showing items 1-4 of 4

    • A novel Two-Factor HoneyToken Authentication Mechanism 

      Papaspirou V., Maglaras L., Ferrag M.A., Kantzavelou I., Janicke H., Douligeris C. (2021)
      The majority of systems rely on user authentication on passwords, but passwords have so many weaknesses and widespread use that easily raise significant security concerns, regardless of their encrypted form. Users hold the ...
    • Speed optimized face recognition on mobile devices using Eigenfaces decomposition 

      Doukas, C.; Maglogiannis, M. (2010)
      Face recognition on mobile devices can be utilized for security applications (e.g., user authentication) or in the context of pervasive and assistive computing for the support of elderly suffering from dementia in recognizing ...
    • User authentication method and implementation using a three-axis accelerometer 

      Zaharis, A.; Martini, A.; Kikiras, P.; Stamoulis, G. (2010)
      The rapid growth of accelerometer use on consumer electronics has brought an opportunity for unique user authentication. We present an efficient recognition algorithm for such interaction using a single three-axis ...
    • Using deep learning neural networks for ECG based authentication 

      Chamatidis I., Katsika A., Spathoulas G. (2017)
      Traditional password based authentication has been proven inadequate and the use of biometrics have provided multiple solutions through the past years. One of the most recent approaches to biometric authentication is using ...