Toward a Secure and Usable User Authentication Mechanism for Mobile Passenger ID Devices for Land/Sea Border Control
Nowadays the critical sector of transport becomes progressively more dependent on digital technologies to perform essential activities and develop novel efficient transport services and infrastructure to empower economic and social cohesion exploiting the economic strengths of the European Union (EU...
Saved in:
Published in | IEEE access Vol. 10; pp. 38832 - 38849 |
---|---|
Main Authors | , , , , |
Format | Journal Article |
Language | English |
Published |
Piscataway
IEEE
2022
The Institute of Electrical and Electronics Engineers, Inc. (IEEE) |
Subjects | |
Online Access | Get full text |
Cover
Loading…
Abstract | Nowadays the critical sector of transport becomes progressively more dependent on digital technologies to perform essential activities and develop novel efficient transport services and infrastructure to empower economic and social cohesion exploiting the economic strengths of the European Union (EU). However, although the continuously increasing number of visitors, entering the EU through land-border crossing points or seaports, brings immense economic value, novel border control solutions, such as mobile devices for passenger identification for land/sea border control, are essential to precisely identify passengers "on the fly" ensuring their comfort. Nevertheless, these devices are expected to handle highly confidential personal data and thus, it is very likely to become an attractive target to malicious actors. Therefore, to ensure high level of device security without interrupting border control activities, strong secure and usable user authentication mechanisms are required. Towards this direction, we, firstly, discuss risk-based and adaptive authentication for mobile devices as a suitable approach to deal with the security vs. usability challenge and a novel risk-based adaptive user authentication mechanism is proposed to address this challenge. Afterwards, a set of popular Machine Learning (ML) classification algorithms for risk-based authentication was tested and evaluated on the HuMIdb (Human Mobile Interaction database) dataset to identify the most appropriate ones for the proposed mechanism. The evaluation results demonstrated impact of overfitting (i.e., accuracy: 1,0000) and therefore, we considered novelty detection algorithms to overcome this challenge and demonstrate high performance. To the best of our knowledge, this is the first time that novelty detection algorithms have been considered for risk-based adaptive user authentication showing promising results (OneClassSVM 0,9536, LOF 0,9740, KNN_average 0,9998). |
---|---|
AbstractList | Nowadays the critical sector of transport becomes progressively more dependent on digital technologies to perform essential activities and develop novel efficient transport services and infrastructure to empower economic and social cohesion exploiting the economic strengths of the European Union (EU). However, although the continuously increasing number of visitors, entering the EU through land-border crossing points or seaports, brings immense economic value, novel border control solutions, such as mobile devices for passenger identification for land/sea border control, are essential to precisely identify passengers "on the fly" ensuring their comfort. Nevertheless, these devices are expected to handle highly confidential personal data and thus, it is very likely to become an attractive target to malicious actors. Therefore, to ensure high level of device security without interrupting border control activities, strong secure and usable user authentication mechanisms are required. Towards this direction, we, firstly, discuss risk-based and adaptive authentication for mobile devices as a suitable approach to deal with the security vs. usability challenge and a novel risk-based adaptive user authentication mechanism is proposed to address this challenge. Afterwards, a set of popular Machine Learning (ML) classification algorithms for risk-based authentication was tested and evaluated on the HuMIdb (Human Mobile Interaction database) dataset to identify the most appropriate ones for the proposed mechanism. The evaluation results demonstrated impact of overfitting (i.e., accuracy: 1,0000) and therefore, we considered novelty detection algorithms to overcome this challenge and demonstrate high performance. To the best of our knowledge, this is the first time that novelty detection algorithms have been considered for risk-based adaptive user authentication showing promising results (OneClassSVM 0,9536, LOF 0,9740, KNN_average 0,9998). |
Author | Rodriguez, Jonathan Essop, Ismael Papaioannou, Maria Mantas, Georgios Zachos, Georgios |
Author_xml | – sequence: 1 givenname: Maria orcidid: 0000-0003-3830-7190 surname: Papaioannou fullname: Papaioannou, Maria email: m.papaioannou@av.it.pt organization: Instituto de Telecomunicações, Aveiro, Portugal – sequence: 2 givenname: Georgios orcidid: 0000-0001-9130-4605 surname: Zachos fullname: Zachos, Georgios organization: Instituto de Telecomunicações, Aveiro, Portugal – sequence: 3 givenname: Ismael orcidid: 0000-0002-5583-0306 surname: Essop fullname: Essop, Ismael organization: Faculty of Engineering and Science, University of Greenwich, Chatham Maritime, U.K – sequence: 4 givenname: Georgios orcidid: 0000-0002-8074-0417 surname: Mantas fullname: Mantas, Georgios organization: Instituto de Telecomunicações, Aveiro, Portugal – sequence: 5 givenname: Jonathan orcidid: 0000-0001-9829-0955 surname: Rodriguez fullname: Rodriguez, Jonathan organization: Instituto de Telecomunicações, Aveiro, Portugal |
BookMark | eNpNUV1P4zAQtBBIcMAv4MXSPbf1V-L4sRc4qFR0JxWerY29gVTF5uwUdP8eQxDCL2vNzszuan6QwxADEnLB2ZxzZhbLtr3abOaCCTGXvFZCVQfkRPDazGQl68Nv_2NynvOWldcUqNInZLyLr5A8BbpBt09IIXh6n6HbYSmY6HI_PmIYBwfjEAO9RfcIYchPtI-J3sZuKMS_kDOGh8JeXdJLfBkc5o_-urgtNgj0V0y-tNsYxhR3Z-Soh13G8896Su5_X921N7P1n-tVu1zPnGLNOOs8ut4BUyB8J0Xdq74XqpPgRWO460zd-MpVXANo3mPNvFGi3Mq0UNBwI0_JavL1Ebb2OQ1PkP7bCIP9AGJ6sJDKaTu0HTD02nNeMaPqMh4Z4wXRsjEOpCpePyev5xT_7TGPdhv3KZT1ragroRnTpiosObFcijkn7L-mcmbf07JTWvY9LfuZVlFdTKoBEb8URittSmpvvV2RZw |
CODEN | IAECCG |
CitedBy_id | crossref_primary_10_3390_s23062979 crossref_primary_10_1109_ACCESS_2023_3286376 |
Cites_doi | 10.6028/nist.sp.800-28ver2 10.1002/ett.4049 10.1109/JSYST.2014.2306210 10.1109/TCC.2021.3084538 10.1108/09685220210417463 10.1109/CAMAD52502.2021.9617802 10.6028/nist.sp.800-30r1 10.1109/FMEC.2019.8795332 10.1109/MSP.2016.2555335 10.1109/ACCESS.2020.2969626 10.1007/978-3-642-27739-9_1580-1 10.1145/2751323.2751329 10.5220/0006292602540260 10.1109/CSNDSP49049.2020.9249574 10.6028/nist.ir.8080 10.1155/2018/2649598 10.1145/2702123.2702141 10.1007/s11042-013-1518-5 10.1109/CAMAD52502.2021.9617809 10.1016/j.eswa.2007.12.020 10.1007/978-3-642-22890-2_18 10.1002/9781118867464.ch9 10.1109/MeditCom49071.2021.9647603 10.1007/s11036-019-01220-y 10.1109/PTC.2015.7232494 10.1016/j.comnet.2020.107118 10.1109/SPW.2016.20 10.1002/9781119162315 10.5120/18097-9155 10.18356/9789214030515 10.6028/nist.ir.8196 10.1002/9781119183471 10.1007/978-3-030-05195-2_14 10.1145/3129790.3129801 10.1142/9789814261302_0010 10.1109/UIC-ATC.2017.8397628 10.1007/978-3-030-04372-8_3 10.1109/MeditCom49071.2021.9647521 10.3390/s21041528 10.1057/ejis.2009.9 |
ContentType | Journal Article |
Copyright | Copyright The Institute of Electrical and Electronics Engineers, Inc. (IEEE) 2022 |
Copyright_xml | – notice: Copyright The Institute of Electrical and Electronics Engineers, Inc. (IEEE) 2022 |
DBID | 97E ESBDL RIA RIE AAYXX CITATION 7SC 7SP 7SR 8BQ 8FD JG9 JQ2 L7M L~C L~D DOA |
DOI | 10.1109/ACCESS.2022.3164245 |
DatabaseName | IEEE All-Society Periodicals Package (ASPP) 2005-present IEEE Xplore Open Access Journals IEEE All-Society Periodicals Package (ASPP) 1998-Present IEEE Electronic Library Online CrossRef Computer and Information Systems Abstracts Electronics & Communications Abstracts Engineered Materials Abstracts METADEX Technology Research Database Materials Research Database ProQuest Computer Science Collection Advanced Technologies Database with Aerospace Computer and Information Systems Abstracts Academic Computer and Information Systems Abstracts Professional Directory of Open Access Journals |
DatabaseTitle | CrossRef Materials Research Database Engineered Materials Abstracts Technology Research Database Computer and Information Systems Abstracts – Academic Electronics & Communications Abstracts ProQuest Computer Science Collection Computer and Information Systems Abstracts Advanced Technologies Database with Aerospace METADEX Computer and Information Systems Abstracts Professional |
DatabaseTitleList | Materials Research Database |
Database_xml | – sequence: 1 dbid: DOA name: Directory of Open Access Journals url: https://www.doaj.org/ sourceTypes: Open Website – sequence: 2 dbid: RIE name: IEEE Electronic Library Online url: https://proxy.k.utb.cz/login?url=https://ieeexplore.ieee.org/ sourceTypes: Publisher |
DeliveryMethod | fulltext_linktorsrc |
Discipline | Economics Engineering |
EISSN | 2169-3536 |
EndPage | 38849 |
ExternalDocumentID | oai_doaj_org_article_ba0ed7d1150946408e001ed77389ca34 10_1109_ACCESS_2022_3164245 9747935 |
Genre | orig-research |
GrantInformation_xml | – fundername: European Union’s Horizon 2020 Research and Innovation Programme grantid: H2020-MSCA-RISE-2019-eBORDER-872878 |
GroupedDBID | 0R~ 4.4 5VS 6IK 97E AAJGR ABVLG ACGFS ADBBV ALMA_UNASSIGNED_HOLDINGS BCNDV BEFXN BFFAM BGNUA BKEBE BPEOZ EBS EJD ESBDL GROUPED_DOAJ IFIPE IPLJI JAVBF KQ8 M43 M~E O9- OCL OK1 RIA RIE RIG RNS AAYXX CITATION 7SC 7SP 7SR 8BQ 8FD JG9 JQ2 L7M L~C L~D |
ID | FETCH-LOGICAL-c408t-bdecfca04a2db326f4ff24b3ad2891cb968d5c517aa71fe60d9422160724a8193 |
IEDL.DBID | DOA |
ISSN | 2169-3536 |
IngestDate | Tue Oct 22 15:12:15 EDT 2024 Thu Oct 10 16:23:30 EDT 2024 Fri Aug 23 00:57:50 EDT 2024 Wed Jun 26 19:25:17 EDT 2024 |
IsDoiOpenAccess | true |
IsOpenAccess | true |
IsPeerReviewed | true |
IsScholarly | true |
Language | English |
LinkModel | DirectLink |
MergedId | FETCHMERGED-LOGICAL-c408t-bdecfca04a2db326f4ff24b3ad2891cb968d5c517aa71fe60d9422160724a8193 |
ORCID | 0000-0001-9130-4605 0000-0002-5583-0306 0000-0003-3830-7190 0000-0002-8074-0417 0000-0001-9829-0955 |
OpenAccessLink | https://doaj.org/article/ba0ed7d1150946408e001ed77389ca34 |
PQID | 2652700795 |
PQPubID | 4845423 |
PageCount | 18 |
ParticipantIDs | crossref_primary_10_1109_ACCESS_2022_3164245 ieee_primary_9747935 proquest_journals_2652700795 doaj_primary_oai_doaj_org_article_ba0ed7d1150946408e001ed77389ca34 |
PublicationCentury | 2000 |
PublicationDate | 20220000 2022-00-00 20220101 2022-01-01 |
PublicationDateYYYYMMDD | 2022-01-01 |
PublicationDate_xml | – year: 2022 text: 20220000 |
PublicationDecade | 2020 |
PublicationPlace | Piscataway |
PublicationPlace_xml | – name: Piscataway |
PublicationTitle | IEEE access |
PublicationTitleAbbrev | Access |
PublicationYear | 2022 |
Publisher | IEEE The Institute of Electrical and Electronics Engineers, Inc. (IEEE) |
Publisher_xml | – name: IEEE – name: The Institute of Electrical and Electronics Engineers, Inc. (IEEE) |
References | ref13 ref57 ref12 ref56 ref15 ref14 (ref5) 2018 ref11 ref10 ref16 ref19 Obuchi (ref28) 2006 ref51 ref50 ref46 ref45 ref48 ref42 ref41 ref44 ref43 Friedman (ref49) 1991 ref8 ref7 ref9 (ref37) 2015 Hurkala (ref53) Witten (ref54) 2011 ref4 ref3 ref6 ref40 Titcomb (ref23) 2017 ref35 ref34 Van Hamme (ref36) 2018 ref31 ref30 Géron (ref58) 2019 ref33 ref32 Pedregosa (ref59) 2011; 12 ref2 ref39 ref38 Jakobsen (ref1) 2019 Acien (ref18) 2020 Kovach (ref22) 2017 Charles (ref24) 2013 ref26 ref25 ref20 ref21 Forsblom (ref29) 2015 ref27 Acien (ref17) 2020 Shang (ref47) 2013 Yousefi (ref55) 2019 Zhao (ref60) 2019; 20 (ref52) 2017 |
References_xml | – volume-title: arXiv:1802.07233 year: 2018 ident: ref36 article-title: Frictionless authentication systems: Emerging trends, research challenges and opportunities contributor: fullname: Van Hamme – ident: ref40 doi: 10.6028/nist.sp.800-28ver2 – ident: ref11 doi: 10.1002/ett.4049 – ident: ref48 doi: 10.1109/JSYST.2014.2306210 – ident: ref3 doi: 10.1109/TCC.2021.3084538 – ident: ref21 doi: 10.1108/09685220210417463 – volume-title: arXiv:2005.13655 year: 2020 ident: ref17 article-title: BeCAPTCHA: Bot detection in smartphone interaction using touchscreen biometrics and mobile sensors contributor: fullname: Acien – start-page: 1 volume-title: arXiv:1912.02629 year: 2019 ident: ref55 article-title: A comprehensive survey on machine learning techniques and user authentication approaches for credit card fraud detection contributor: fullname: Yousefi – ident: ref7 doi: 10.1109/CAMAD52502.2021.9617802 – start-page: 144 volume-title: Transport in the European Union: Current Trends and Issues year: 2018 ident: ref5 – ident: ref42 doi: 10.6028/nist.sp.800-30r1 – ident: ref46 doi: 10.1109/FMEC.2019.8795332 – volume-title: Applying fuzzy logic to risk assessment and decision-making. Casualty Actuarial Society, Canadian Institute of Actuaries, Society of Actuaries year: 2013 ident: ref47 contributor: fullname: Shang – ident: ref32 doi: 10.1109/MSP.2016.2555335 – ident: ref25 doi: 10.1109/ACCESS.2020.2969626 – volume-title: PDA Speech Database year: 2006 ident: ref28 contributor: fullname: Obuchi – ident: ref33 doi: 10.1007/978-3-642-27739-9_1580-1 – volume-title: Business insider-Samsung’s Galaxy S8 facial recognition feature can be fooled with a photo year: 2017 ident: ref22 contributor: fullname: Kovach – ident: ref38 doi: 10.1145/2751323.2751329 – volume-title: The RSA Risk Engine year: 2015 ident: ref37 – ident: ref45 doi: 10.5220/0006292602540260 – volume-title: Hackers claim to beat iPhone X’s face id in one week with 115 mask year: 2017 ident: ref23 contributor: fullname: Titcomb – volume-title: Risk-Based Authentication year: 2017 ident: ref52 – ident: ref6 doi: 10.1109/CSNDSP49049.2020.9249574 – volume-title: The guardian-iPhone 5S fingerprint sensor hacked by Germany’s chaos computer club year: 2013 ident: ref24 contributor: fullname: Charles – volume: 20 start-page: 1 issue: 96 year: 2019 ident: ref60 article-title: PyOD: A Python toolbox for scalable outlier detection publication-title: J. Mach. Learn. Res. contributor: fullname: Zhao – ident: ref15 doi: 10.6028/nist.ir.8080 – ident: ref16 doi: 10.1155/2018/2649598 – ident: ref30 doi: 10.1145/2702123.2702141 – ident: ref34 doi: 10.1007/s11042-013-1518-5 – ident: ref4 doi: 10.1109/CAMAD52502.2021.9617809 – ident: ref56 doi: 10.1016/j.eswa.2007.12.020 – volume-title: Were You Aware of All These Sensors in Your Smartphone? year: 2015 ident: ref29 contributor: fullname: Forsblom – ident: ref41 doi: 10.1007/978-3-642-22890-2_18 – volume-title: Data Mining year: 2011 ident: ref54 contributor: fullname: Witten – ident: ref10 doi: 10.1002/9781118867464.ch9 – volume: 12 start-page: 2825 year: 2011 ident: ref59 article-title: Scikit-learn: Machine learning in Python publication-title: J. Mach. Learn. Res. contributor: fullname: Pedregosa – ident: ref14 doi: 10.1109/MeditCom49071.2021.9647603 – volume-title: arXiv:2002.00918 year: 2020 ident: ref18 article-title: BeCAPTCHA: Detecting human behavior in smartphone interaction using multiple inbuilt sensors contributor: fullname: Acien – ident: ref8 doi: 10.1007/s11036-019-01220-y – ident: ref51 doi: 10.1109/PTC.2015.7232494 – start-page: 1 year: 2019 ident: ref1 article-title: Challenges to effective EU cybersecurity policy—Briefing paper publication-title: Eur. Court Audit. contributor: fullname: Jakobsen – ident: ref9 doi: 10.1016/j.comnet.2020.107118 – ident: ref27 doi: 10.1109/SPW.2016.20 – ident: ref43 doi: 10.1002/9781119162315 – ident: ref44 doi: 10.5120/18097-9155 – ident: ref2 doi: 10.18356/9789214030515 – volume-title: Fuzzy Expert Systems year: 1991 ident: ref49 article-title: On the design of a fuzzy intelligent differential equation solver contributor: fullname: Friedman – ident: ref31 doi: 10.6028/nist.ir.8196 – ident: ref19 doi: 10.1002/9781119183471 – volume-title: Hands-On Machine Learning With Scikit-Learn and TensorFlow: Concepts, Tools, and Techniques to Build Intelligent Systems year: 2019 ident: ref58 contributor: fullname: Géron – ident: ref26 doi: 10.1007/978-3-030-05195-2_14 – ident: ref39 doi: 10.1145/3129790.3129801 – ident: ref50 doi: 10.1142/9789814261302_0010 – ident: ref57 doi: 10.1109/UIC-ATC.2017.8397628 – ident: ref35 doi: 10.1007/978-3-030-04372-8_3 – start-page: 219 volume-title: Proc. ICIEIS ident: ref53 article-title: Architecture of context-risk-aware authentication system for web environments contributor: fullname: Hurkala – ident: ref13 doi: 10.1109/MeditCom49071.2021.9647521 – ident: ref12 doi: 10.3390/s21041528 – ident: ref20 doi: 10.1057/ejis.2009.9 |
SSID | ssj0000816957 |
Score | 2.335256 |
Snippet | Nowadays the critical sector of transport becomes progressively more dependent on digital technologies to perform essential activities and develop novel... |
SourceID | doaj proquest crossref ieee |
SourceType | Open Website Aggregation Database Publisher |
StartPage | 38832 |
SubjectTerms | Adaptive user authentication Algorithms Anomaly detection Authentication border control security Boundaries Classification algorithms Economics Electronic devices Human factors Identification Machine learning Machine learning algorithms Mobile handsets mobile passenger ID devices Passengers Risk Risk management risk-based user authentication Security |
SummonAdditionalLinks | – databaseName: IEEE Electronic Library Online dbid: RIE link: http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwjV1LT9tAEB4BF-DQ8mjVUEB76BEn9nptZ48QQIBIValE4mbtY1aqEEmVOJf-embWTtRCD5xsrR_a1bePb2ZnvgX45obGYG7zRDtVJsprm2grPRG5oiIyZ3SWc3Ly-Ht5M1F3j8XjBpytc2EQMQafYZ9v416-n7klu8oGzH11XmzC5jCVba7W2p_CB0joouqEhbJUD85HI2oDmYBSkmVa8hbfP4tP1OjvDlV5MxPH5eX6I4xXFWujSp76y8b23Z9Xmo3vrfkefOh4pjhvO8Y-bOD0ALZXaciLA9j9S4nwEJqHGD4rjIgOeBRm6sVkwXlVdMG5YFcaBxa1Hj4xRs4Y_rV4FkR6xXhmaXIRP4iIc5DsXNxeikuMc1B8fk9_G_xEIy6i0qcYtfHxn2ByffUwukm6AxkSp9Jhk1iPLjiTKiO9Jd4XVAhS2dx4MtsyZ3U59IUrssqYKgtYpl4rKVnCTipD1CP_DFvT2RS_gCAzyThLmJnANlNlStbNsdIGG4iihR6crZCqf7e6G3W0V1Jdt8DWDGzdAduDC0Zz_SqLZscCQqHuxiDxghR95ZkDa1VSi5DWaCqpiLQ5k6seHDJy6590oPXgeNU36m6AL2pZFrxlX-ni6P9ffYUdrmDrrTmGrWa-xBPiL409jR33BTH17OY priority: 102 providerName: IEEE |
Title | Toward a Secure and Usable User Authentication Mechanism for Mobile Passenger ID Devices for Land/Sea Border Control |
URI | https://ieeexplore.ieee.org/document/9747935 https://www.proquest.com/docview/2652700795 https://doaj.org/article/ba0ed7d1150946408e001ed77389ca34 |
Volume | 10 |
hasFullText | 1 |
inHoldings | 1 |
isFullTextHit | |
isPrint | |
link | http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwrV09T8MwELUQEwyIT1EoyAMjURPHceoRCggQRUhQic06f0kMFNSW_8-dHVARAwtTpCRy4rvk_N75_MzYiRsChNrWhXZSFdJrW2grPAK5pkUwB7qqaXHy-F5dT-Ttc_O8tNUX1YRleeBsuIGFMvjWE3DRUslyGDCw4pkWR1oHdVYCrZolMpVi8LBSumk7maGq1IOz0Qh7hIRQCOSpiib8fgxFSbG_22LlV1xOg83VJtvoUCI_y2-3xVbCdJutL2kH7rDFUyp45cBTyjxwmHo-mdNKKDyEGafkF5UC5ZwcHwda4_syf-UIU_n4zWI44A8InamsdcZvLvhFSFEjXb_D1gaPAfh50ubko1zRvssmV5dPo-ui20KhcGiqRWF9cNFBKUF4i0gtyhiFtDV4JFqVs1oNfeOaqgVoqxhU6bUUgkTnhAQEC_UeW52-TcM-40hswFm0K0RiOS0oUrqxwkYbEVTFHjv9sqZ5z0oZJjGMUptsfEPGN53xe-ycLP59K8lcpxPofNM53_zl_B7bIX99N0LkSNfYdv_Lf6b7JedGqIYm2VvdHPzHow_ZGnUnZ2P6bHUx-whHiE8W9jh9isdpKeEnt9Xf2A |
link.rule.ids | 315,786,790,802,870,2115,4043,27954,27955,27956,55107 |
linkProvider | Directory of Open Access Journals |
linkToHtml | http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwjV1LbxMxEB6Vcig98GhBBAr4wLGb7Hq96_jYplQpZCskEqk3y08JIRKUbC799cx4NxGvA6ddeR-y9fnxzXjmM8B7NzYmlLbMlBN1JryymbLcI5GrJJI5o4qSkpOb23q6EB_vqrsDON_nwoQQUvBZGNJt2sv3K7clV9mIuK8qqwfwENf5XHbZWnuPCh0hoSrZSwsVuRpdTCbYCjQCOUfbtKZNvt-Wn6TS3x-r8tdcnBaY6yfQ7KrWxZV8G25bO3T3f6g2_m_dn8Ljnmmyi65rPIODsDyBo10i8uYEjn_RIjyFdp4CaJlhyQUfmFl6tthQZhVewpqRM41CizofH2sC5Qx_3XxnSHtZs7I4vbDPSMUpTHbNbq7YVUizUHo-w7-NvgTDLpPWJ5t0EfLPYXH9YT6ZZv2RDJkT-bjNrA8uOpMLw71F5hdFjFzY0ng03ApnVT32lasKaYwsYqhzrwTnJGLHhUHyUb6Aw-VqGV4CQ0PJOIuYmUhWkzQ1KedYbqONSNLiAM53SOkfnfKGThZLrnQHrCZgdQ_sAC4Jzf2rJJudChAF3Y9CZAZ58NITC1aixhYFXKWxRCJtc6YUAzgl5PY_6UEbwNmub-h-iG80ryvatJeqevXvr97B0XTezPTs5vbTa3hEle18N2dw2K634Q2ymda-TZ34J9Cu8Do |
openUrl | ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.atitle=Toward+a+Secure+and+Usable+User+Authentication+Mechanism+for+Mobile+Passenger+ID+Devices+for+Land%2FSea+Border+Control&rft.jtitle=IEEE+access&rft.au=Papaioannou%2C+Maria&rft.au=Zachos%2C+Georgios&rft.au=Essop%2C+Ismael&rft.au=Mantas%2C+Georgios&rft.date=2022&rft.issn=2169-3536&rft.eissn=2169-3536&rft.volume=10&rft.spage=38832&rft.epage=38849&rft_id=info:doi/10.1109%2FACCESS.2022.3164245&rft.externalDBID=n%2Fa&rft.externalDocID=10_1109_ACCESS_2022_3164245 |
thumbnail_l | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/lc.gif&issn=2169-3536&client=summon |
thumbnail_m | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/mc.gif&issn=2169-3536&client=summon |
thumbnail_s | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/sc.gif&issn=2169-3536&client=summon |