authentication

Digitale Identitäten und Authentifizierung

Die aktuelle Situation fordert Unternehmen nicht nur in der Organisation Ihres Kerngeschäfts, sondern auch bei der Sicherheit der geschäftsrelevanten IT-Infrastruktur. Home-Office und die digitale Zusammenarbeit mit Mitarbeitern und Geschäftspartnern …

Smartphone-based Gait Recognition: From Authentication to Imitation

This work evaluates the security strength of a smartphone-based gait recognition system against zero-effort and live minimal-effort impersonation attacks under realistic scenarios. For this purpose, we developed an Android application, which uses a …

ShakeUnlock: Securely Transfer Authentication States Between Mobile Devices

As users start carrying multiple mobile devices, we propose a novel, token based mobile device unlocking approach. Mobile devices are conjointly shaken to transfer the authentication state from an unlocked token device to another device to unlock it. …

CORMORANT: Towards Continuous Risk-aware Multi-modal Cross-device Authentication