Abstract: As one of the essential steps to secure government data sharing, Identity Authentication (IA) plays a vital role in the processing of large data. However, the centralized IA scheme based on ...
ConsentFix is an OAuth phishing technique abusing browser-based authorization flows to hijack Microsoft accounts. Push ...
Multi-factor authentication (MFA) is a login authentication method requiring multiple proofs of identity. It adds another proof, such as a code sent to an app or phone. WKU uses MFA to better protect ...
Abstract: Electronic voting systems are increasingly adopted to enhance the efficiency and security of elections. However, concerns over voter authentication, data integrity, and vote confidentiality ...