• Device Enhanced Authentication: Passwords and Second Factors 

      Shirvanian, Maliheh (Georgia Institute of Technology, 2019-01-11)
      Despite all the advancement in authentication schemes, text-based authentication is perhaps still the most common way of user authentication (e.g., textual passwords or personal identification numbers - PINs). However, ...
    • Hardware-Based Security and Trust For IoT and Supply Chain Authentication 

      Plusquellic, James F. (Georgia Institute of Technology, 2017-04-21)
      New hardware architectures for Internet-of-Things (IoT) are emerging rapidly in response to con- sumer demands for improved situational awareness, instant access to widely distributed sources of news and information and ...
    • rtCaptcha 

      Uzun, Erkam (Georgia Institute of Technology, 2018-04-12)
      More organizations are turning to facial and voice recognition, or other biometric identifiers, to authenticate users and grant access to their systems. In particular, some services (e.g. Mastercard Identity Check) allow ...
    • rtCaptcha: A Real-Time CAPTCHA Based Liveness Detection System 

      Uzun, Erkam (Georgia Institute of Technology, 2018-03-02)
      Facial/voice-based authentication is becoming increasingly popular (e.g., already adopted by MasterCard and AliPay), because it is easy to use. In particular, users can now authenticate themselves to online services by ...