• A novel Two-Factor HoneyToken Authentication Mechanism 

      Papaspirou V., Maglaras L., Ferrag M.A., Kantzavelou I., Janicke H., Douligeris C. (2021)
      The majority of systems rely on user authentication on passwords, but passwords have so many weaknesses and widespread use that easily raise significant security concerns, regardless of their encrypted form. Users hold the ...
    • Security Revisited: Honeytokens meet Google Authenticator 

      Papaspirou V., Papathanasaki M., Maglaras L., Kantzavelou I., Douligeris C., Ferrag M.A., Janicke H. (2022)
      In contrast to the rapid advancement and evolution of technology, computer systems rely significantly on passwords to maintain their security for an unreasonably long time. Although the introduction of two or more factors ...