Toward a Secure and Usable User Authentication Mechanism for Mobile Passenger ID Devices for Land/Sea Border Control

Nowadays the critical sector of transport becomes progressively more dependent on digital technologies to perform essential activities and develop novel efficient transport services and infrastructure to empower economic and social cohesion exploiting the economic strengths of the European Union (EU...

Full description

Saved in:
Bibliographic Details
Published inIEEE access Vol. 10; pp. 38832 - 38849
Main Authors Papaioannou, Maria, Zachos, Georgios, Essop, Ismael, Mantas, Georgios, Rodriguez, Jonathan
Format Journal Article
LanguageEnglish
Published Piscataway IEEE 2022
The Institute of Electrical and Electronics Engineers, Inc. (IEEE)
Subjects
Online AccessGet full text

Cover

Loading…
Abstract Nowadays the critical sector of transport becomes progressively more dependent on digital technologies to perform essential activities and develop novel efficient transport services and infrastructure to empower economic and social cohesion exploiting the economic strengths of the European Union (EU). However, although the continuously increasing number of visitors, entering the EU through land-border crossing points or seaports, brings immense economic value, novel border control solutions, such as mobile devices for passenger identification for land/sea border control, are essential to precisely identify passengers "on the fly" ensuring their comfort. Nevertheless, these devices are expected to handle highly confidential personal data and thus, it is very likely to become an attractive target to malicious actors. Therefore, to ensure high level of device security without interrupting border control activities, strong secure and usable user authentication mechanisms are required. Towards this direction, we, firstly, discuss risk-based and adaptive authentication for mobile devices as a suitable approach to deal with the security vs. usability challenge and a novel risk-based adaptive user authentication mechanism is proposed to address this challenge. Afterwards, a set of popular Machine Learning (ML) classification algorithms for risk-based authentication was tested and evaluated on the HuMIdb (Human Mobile Interaction database) dataset to identify the most appropriate ones for the proposed mechanism. The evaluation results demonstrated impact of overfitting (i.e., accuracy: 1,0000) and therefore, we considered novelty detection algorithms to overcome this challenge and demonstrate high performance. To the best of our knowledge, this is the first time that novelty detection algorithms have been considered for risk-based adaptive user authentication showing promising results (OneClassSVM 0,9536, LOF 0,9740, KNN_average 0,9998).
AbstractList Nowadays the critical sector of transport becomes progressively more dependent on digital technologies to perform essential activities and develop novel efficient transport services and infrastructure to empower economic and social cohesion exploiting the economic strengths of the European Union (EU). However, although the continuously increasing number of visitors, entering the EU through land-border crossing points or seaports, brings immense economic value, novel border control solutions, such as mobile devices for passenger identification for land/sea border control, are essential to precisely identify passengers "on the fly" ensuring their comfort. Nevertheless, these devices are expected to handle highly confidential personal data and thus, it is very likely to become an attractive target to malicious actors. Therefore, to ensure high level of device security without interrupting border control activities, strong secure and usable user authentication mechanisms are required. Towards this direction, we, firstly, discuss risk-based and adaptive authentication for mobile devices as a suitable approach to deal with the security vs. usability challenge and a novel risk-based adaptive user authentication mechanism is proposed to address this challenge. Afterwards, a set of popular Machine Learning (ML) classification algorithms for risk-based authentication was tested and evaluated on the HuMIdb (Human Mobile Interaction database) dataset to identify the most appropriate ones for the proposed mechanism. The evaluation results demonstrated impact of overfitting (i.e., accuracy: 1,0000) and therefore, we considered novelty detection algorithms to overcome this challenge and demonstrate high performance. To the best of our knowledge, this is the first time that novelty detection algorithms have been considered for risk-based adaptive user authentication showing promising results (OneClassSVM 0,9536, LOF 0,9740, KNN_average 0,9998).
Author Rodriguez, Jonathan
Essop, Ismael
Papaioannou, Maria
Mantas, Georgios
Zachos, Georgios
Author_xml – sequence: 1
  givenname: Maria
  orcidid: 0000-0003-3830-7190
  surname: Papaioannou
  fullname: Papaioannou, Maria
  email: m.papaioannou@av.it.pt
  organization: Instituto de Telecomunicações, Aveiro, Portugal
– sequence: 2
  givenname: Georgios
  orcidid: 0000-0001-9130-4605
  surname: Zachos
  fullname: Zachos, Georgios
  organization: Instituto de Telecomunicações, Aveiro, Portugal
– sequence: 3
  givenname: Ismael
  orcidid: 0000-0002-5583-0306
  surname: Essop
  fullname: Essop, Ismael
  organization: Faculty of Engineering and Science, University of Greenwich, Chatham Maritime, U.K
– sequence: 4
  givenname: Georgios
  orcidid: 0000-0002-8074-0417
  surname: Mantas
  fullname: Mantas, Georgios
  organization: Instituto de Telecomunicações, Aveiro, Portugal
– sequence: 5
  givenname: Jonathan
  orcidid: 0000-0001-9829-0955
  surname: Rodriguez
  fullname: Rodriguez, Jonathan
  organization: Instituto de Telecomunicações, Aveiro, Portugal
BookMark eNpNUV1P4zAQtBBIcMAv4MXSPbf1V-L4sRc4qFR0JxWerY29gVTF5uwUdP8eQxDCL2vNzszuan6QwxADEnLB2ZxzZhbLtr3abOaCCTGXvFZCVQfkRPDazGQl68Nv_2NynvOWldcUqNInZLyLr5A8BbpBt09IIXh6n6HbYSmY6HI_PmIYBwfjEAO9RfcIYchPtI-J3sZuKMS_kDOGh8JeXdJLfBkc5o_-urgtNgj0V0y-tNsYxhR3Z-Soh13G8896Su5_X921N7P1n-tVu1zPnGLNOOs8ut4BUyB8J0Xdq74XqpPgRWO460zd-MpVXANo3mPNvFGi3Mq0UNBwI0_JavL1Ebb2OQ1PkP7bCIP9AGJ6sJDKaTu0HTD02nNeMaPqMh4Z4wXRsjEOpCpePyev5xT_7TGPdhv3KZT1ragroRnTpiosObFcijkn7L-mcmbf07JTWvY9LfuZVlFdTKoBEb8URittSmpvvV2RZw
CODEN IAECCG
CitedBy_id crossref_primary_10_3390_s23062979
crossref_primary_10_1109_ACCESS_2023_3286376
Cites_doi 10.6028/nist.sp.800-28ver2
10.1002/ett.4049
10.1109/JSYST.2014.2306210
10.1109/TCC.2021.3084538
10.1108/09685220210417463
10.1109/CAMAD52502.2021.9617802
10.6028/nist.sp.800-30r1
10.1109/FMEC.2019.8795332
10.1109/MSP.2016.2555335
10.1109/ACCESS.2020.2969626
10.1007/978-3-642-27739-9_1580-1
10.1145/2751323.2751329
10.5220/0006292602540260
10.1109/CSNDSP49049.2020.9249574
10.6028/nist.ir.8080
10.1155/2018/2649598
10.1145/2702123.2702141
10.1007/s11042-013-1518-5
10.1109/CAMAD52502.2021.9617809
10.1016/j.eswa.2007.12.020
10.1007/978-3-642-22890-2_18
10.1002/9781118867464.ch9
10.1109/MeditCom49071.2021.9647603
10.1007/s11036-019-01220-y
10.1109/PTC.2015.7232494
10.1016/j.comnet.2020.107118
10.1109/SPW.2016.20
10.1002/9781119162315
10.5120/18097-9155
10.18356/9789214030515
10.6028/nist.ir.8196
10.1002/9781119183471
10.1007/978-3-030-05195-2_14
10.1145/3129790.3129801
10.1142/9789814261302_0010
10.1109/UIC-ATC.2017.8397628
10.1007/978-3-030-04372-8_3
10.1109/MeditCom49071.2021.9647521
10.3390/s21041528
10.1057/ejis.2009.9
ContentType Journal Article
Copyright Copyright The Institute of Electrical and Electronics Engineers, Inc. (IEEE) 2022
Copyright_xml – notice: Copyright The Institute of Electrical and Electronics Engineers, Inc. (IEEE) 2022
DBID 97E
ESBDL
RIA
RIE
AAYXX
CITATION
7SC
7SP
7SR
8BQ
8FD
JG9
JQ2
L7M
L~C
L~D
DOA
DOI 10.1109/ACCESS.2022.3164245
DatabaseName IEEE All-Society Periodicals Package (ASPP) 2005-present
IEEE Xplore Open Access Journals
IEEE All-Society Periodicals Package (ASPP) 1998-Present
IEEE Electronic Library Online
CrossRef
Computer and Information Systems Abstracts
Electronics & Communications Abstracts
Engineered Materials Abstracts
METADEX
Technology Research Database
Materials Research Database
ProQuest Computer Science Collection
Advanced Technologies Database with Aerospace
Computer and Information Systems Abstracts – Academic
Computer and Information Systems Abstracts Professional
Directory of Open Access Journals
DatabaseTitle CrossRef
Materials Research Database
Engineered Materials Abstracts
Technology Research Database
Computer and Information Systems Abstracts – Academic
Electronics & Communications Abstracts
ProQuest Computer Science Collection
Computer and Information Systems Abstracts
Advanced Technologies Database with Aerospace
METADEX
Computer and Information Systems Abstracts Professional
DatabaseTitleList

Materials Research Database
Database_xml – sequence: 1
  dbid: DOA
  name: Directory of Open Access Journals
  url: https://www.doaj.org/
  sourceTypes: Open Website
– sequence: 2
  dbid: RIE
  name: IEEE Electronic Library Online
  url: https://proxy.k.utb.cz/login?url=https://ieeexplore.ieee.org/
  sourceTypes: Publisher
DeliveryMethod fulltext_linktorsrc
Discipline Economics
Engineering
EISSN 2169-3536
EndPage 38849
ExternalDocumentID oai_doaj_org_article_ba0ed7d1150946408e001ed77389ca34
10_1109_ACCESS_2022_3164245
9747935
Genre orig-research
GrantInformation_xml – fundername: European Union’s Horizon 2020 Research and Innovation Programme
  grantid: H2020-MSCA-RISE-2019-eBORDER-872878
GroupedDBID 0R~
4.4
5VS
6IK
97E
AAJGR
ABVLG
ACGFS
ADBBV
ALMA_UNASSIGNED_HOLDINGS
BCNDV
BEFXN
BFFAM
BGNUA
BKEBE
BPEOZ
EBS
EJD
ESBDL
GROUPED_DOAJ
IFIPE
IPLJI
JAVBF
KQ8
M43
M~E
O9-
OCL
OK1
RIA
RIE
RIG
RNS
AAYXX
CITATION
7SC
7SP
7SR
8BQ
8FD
JG9
JQ2
L7M
L~C
L~D
ID FETCH-LOGICAL-c408t-bdecfca04a2db326f4ff24b3ad2891cb968d5c517aa71fe60d9422160724a8193
IEDL.DBID DOA
ISSN 2169-3536
IngestDate Tue Oct 22 15:12:15 EDT 2024
Thu Oct 10 16:23:30 EDT 2024
Fri Aug 23 00:57:50 EDT 2024
Wed Jun 26 19:25:17 EDT 2024
IsDoiOpenAccess true
IsOpenAccess true
IsPeerReviewed true
IsScholarly true
Language English
LinkModel DirectLink
MergedId FETCHMERGED-LOGICAL-c408t-bdecfca04a2db326f4ff24b3ad2891cb968d5c517aa71fe60d9422160724a8193
ORCID 0000-0001-9130-4605
0000-0002-5583-0306
0000-0003-3830-7190
0000-0002-8074-0417
0000-0001-9829-0955
OpenAccessLink https://doaj.org/article/ba0ed7d1150946408e001ed77389ca34
PQID 2652700795
PQPubID 4845423
PageCount 18
ParticipantIDs crossref_primary_10_1109_ACCESS_2022_3164245
ieee_primary_9747935
proquest_journals_2652700795
doaj_primary_oai_doaj_org_article_ba0ed7d1150946408e001ed77389ca34
PublicationCentury 2000
PublicationDate 20220000
2022-00-00
20220101
2022-01-01
PublicationDateYYYYMMDD 2022-01-01
PublicationDate_xml – year: 2022
  text: 20220000
PublicationDecade 2020
PublicationPlace Piscataway
PublicationPlace_xml – name: Piscataway
PublicationTitle IEEE access
PublicationTitleAbbrev Access
PublicationYear 2022
Publisher IEEE
The Institute of Electrical and Electronics Engineers, Inc. (IEEE)
Publisher_xml – name: IEEE
– name: The Institute of Electrical and Electronics Engineers, Inc. (IEEE)
References ref13
ref57
ref12
ref56
ref15
ref14
(ref5) 2018
ref11
ref10
ref16
ref19
Obuchi (ref28) 2006
ref51
ref50
ref46
ref45
ref48
ref42
ref41
ref44
ref43
Friedman (ref49) 1991
ref8
ref7
ref9
(ref37) 2015
Hurkala (ref53)
Witten (ref54) 2011
ref4
ref3
ref6
ref40
Titcomb (ref23) 2017
ref35
ref34
Van Hamme (ref36) 2018
ref31
ref30
Géron (ref58) 2019
ref33
ref32
Pedregosa (ref59) 2011; 12
ref2
ref39
ref38
Jakobsen (ref1) 2019
Acien (ref18) 2020
Kovach (ref22) 2017
Charles (ref24) 2013
ref26
ref25
ref20
ref21
Forsblom (ref29) 2015
ref27
Acien (ref17) 2020
Shang (ref47) 2013
Yousefi (ref55) 2019
Zhao (ref60) 2019; 20
(ref52) 2017
References_xml – volume-title: arXiv:1802.07233
  year: 2018
  ident: ref36
  article-title: Frictionless authentication systems: Emerging trends, research challenges and opportunities
  contributor:
    fullname: Van Hamme
– ident: ref40
  doi: 10.6028/nist.sp.800-28ver2
– ident: ref11
  doi: 10.1002/ett.4049
– ident: ref48
  doi: 10.1109/JSYST.2014.2306210
– ident: ref3
  doi: 10.1109/TCC.2021.3084538
– ident: ref21
  doi: 10.1108/09685220210417463
– volume-title: arXiv:2005.13655
  year: 2020
  ident: ref17
  article-title: BeCAPTCHA: Bot detection in smartphone interaction using touchscreen biometrics and mobile sensors
  contributor:
    fullname: Acien
– start-page: 1
  volume-title: arXiv:1912.02629
  year: 2019
  ident: ref55
  article-title: A comprehensive survey on machine learning techniques and user authentication approaches for credit card fraud detection
  contributor:
    fullname: Yousefi
– ident: ref7
  doi: 10.1109/CAMAD52502.2021.9617802
– start-page: 144
  volume-title: Transport in the European Union: Current Trends and Issues
  year: 2018
  ident: ref5
– ident: ref42
  doi: 10.6028/nist.sp.800-30r1
– ident: ref46
  doi: 10.1109/FMEC.2019.8795332
– volume-title: Applying fuzzy logic to risk assessment and decision-making. Casualty Actuarial Society, Canadian Institute of Actuaries, Society of Actuaries
  year: 2013
  ident: ref47
  contributor:
    fullname: Shang
– ident: ref32
  doi: 10.1109/MSP.2016.2555335
– ident: ref25
  doi: 10.1109/ACCESS.2020.2969626
– volume-title: PDA Speech Database
  year: 2006
  ident: ref28
  contributor:
    fullname: Obuchi
– ident: ref33
  doi: 10.1007/978-3-642-27739-9_1580-1
– volume-title: Business insider-Samsung’s Galaxy S8 facial recognition feature can be fooled with a photo
  year: 2017
  ident: ref22
  contributor:
    fullname: Kovach
– ident: ref38
  doi: 10.1145/2751323.2751329
– volume-title: The RSA Risk Engine
  year: 2015
  ident: ref37
– ident: ref45
  doi: 10.5220/0006292602540260
– volume-title: Hackers claim to beat iPhone X’s face id in one week with 115 mask
  year: 2017
  ident: ref23
  contributor:
    fullname: Titcomb
– volume-title: Risk-Based Authentication
  year: 2017
  ident: ref52
– ident: ref6
  doi: 10.1109/CSNDSP49049.2020.9249574
– volume-title: The guardian-iPhone 5S fingerprint sensor hacked by Germany’s chaos computer club
  year: 2013
  ident: ref24
  contributor:
    fullname: Charles
– volume: 20
  start-page: 1
  issue: 96
  year: 2019
  ident: ref60
  article-title: PyOD: A Python toolbox for scalable outlier detection
  publication-title: J. Mach. Learn. Res.
  contributor:
    fullname: Zhao
– ident: ref15
  doi: 10.6028/nist.ir.8080
– ident: ref16
  doi: 10.1155/2018/2649598
– ident: ref30
  doi: 10.1145/2702123.2702141
– ident: ref34
  doi: 10.1007/s11042-013-1518-5
– ident: ref4
  doi: 10.1109/CAMAD52502.2021.9617809
– ident: ref56
  doi: 10.1016/j.eswa.2007.12.020
– volume-title: Were You Aware of All These Sensors in Your Smartphone?
  year: 2015
  ident: ref29
  contributor:
    fullname: Forsblom
– ident: ref41
  doi: 10.1007/978-3-642-22890-2_18
– volume-title: Data Mining
  year: 2011
  ident: ref54
  contributor:
    fullname: Witten
– ident: ref10
  doi: 10.1002/9781118867464.ch9
– volume: 12
  start-page: 2825
  year: 2011
  ident: ref59
  article-title: Scikit-learn: Machine learning in Python
  publication-title: J. Mach. Learn. Res.
  contributor:
    fullname: Pedregosa
– ident: ref14
  doi: 10.1109/MeditCom49071.2021.9647603
– volume-title: arXiv:2002.00918
  year: 2020
  ident: ref18
  article-title: BeCAPTCHA: Detecting human behavior in smartphone interaction using multiple inbuilt sensors
  contributor:
    fullname: Acien
– ident: ref8
  doi: 10.1007/s11036-019-01220-y
– ident: ref51
  doi: 10.1109/PTC.2015.7232494
– start-page: 1
  year: 2019
  ident: ref1
  article-title: Challenges to effective EU cybersecurity policy—Briefing paper
  publication-title: Eur. Court Audit.
  contributor:
    fullname: Jakobsen
– ident: ref9
  doi: 10.1016/j.comnet.2020.107118
– ident: ref27
  doi: 10.1109/SPW.2016.20
– ident: ref43
  doi: 10.1002/9781119162315
– ident: ref44
  doi: 10.5120/18097-9155
– ident: ref2
  doi: 10.18356/9789214030515
– volume-title: Fuzzy Expert Systems
  year: 1991
  ident: ref49
  article-title: On the design of a fuzzy intelligent differential equation solver
  contributor:
    fullname: Friedman
– ident: ref31
  doi: 10.6028/nist.ir.8196
– ident: ref19
  doi: 10.1002/9781119183471
– volume-title: Hands-On Machine Learning With Scikit-Learn and TensorFlow: Concepts, Tools, and Techniques to Build Intelligent Systems
  year: 2019
  ident: ref58
  contributor:
    fullname: Géron
– ident: ref26
  doi: 10.1007/978-3-030-05195-2_14
– ident: ref39
  doi: 10.1145/3129790.3129801
– ident: ref50
  doi: 10.1142/9789814261302_0010
– ident: ref57
  doi: 10.1109/UIC-ATC.2017.8397628
– ident: ref35
  doi: 10.1007/978-3-030-04372-8_3
– start-page: 219
  volume-title: Proc. ICIEIS
  ident: ref53
  article-title: Architecture of context-risk-aware authentication system for web environments
  contributor:
    fullname: Hurkala
– ident: ref13
  doi: 10.1109/MeditCom49071.2021.9647521
– ident: ref12
  doi: 10.3390/s21041528
– ident: ref20
  doi: 10.1057/ejis.2009.9
SSID ssj0000816957
Score 2.335256
Snippet Nowadays the critical sector of transport becomes progressively more dependent on digital technologies to perform essential activities and develop novel...
SourceID doaj
proquest
crossref
ieee
SourceType Open Website
Aggregation Database
Publisher
StartPage 38832
SubjectTerms Adaptive user authentication
Algorithms
Anomaly detection
Authentication
border control security
Boundaries
Classification algorithms
Economics
Electronic devices
Human factors
Identification
Machine learning
Machine learning algorithms
Mobile handsets
mobile passenger ID devices
Passengers
Risk
Risk management
risk-based user authentication
Security
SummonAdditionalLinks – databaseName: IEEE Electronic Library Online
  dbid: RIE
  link: http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwjV1LT9tAEB4BF-DQ8mjVUEB76BEn9nptZ48QQIBIValE4mbtY1aqEEmVOJf-embWTtRCD5xsrR_a1bePb2ZnvgX45obGYG7zRDtVJsprm2grPRG5oiIyZ3SWc3Ly-Ht5M1F3j8XjBpytc2EQMQafYZ9v416-n7klu8oGzH11XmzC5jCVba7W2p_CB0joouqEhbJUD85HI2oDmYBSkmVa8hbfP4tP1OjvDlV5MxPH5eX6I4xXFWujSp76y8b23Z9Xmo3vrfkefOh4pjhvO8Y-bOD0ALZXaciLA9j9S4nwEJqHGD4rjIgOeBRm6sVkwXlVdMG5YFcaBxa1Hj4xRs4Y_rV4FkR6xXhmaXIRP4iIc5DsXNxeikuMc1B8fk9_G_xEIy6i0qcYtfHxn2ByffUwukm6AxkSp9Jhk1iPLjiTKiO9Jd4XVAhS2dx4MtsyZ3U59IUrssqYKgtYpl4rKVnCTipD1CP_DFvT2RS_gCAzyThLmJnANlNlStbNsdIGG4iihR6crZCqf7e6G3W0V1Jdt8DWDGzdAduDC0Zz_SqLZscCQqHuxiDxghR95ZkDa1VSi5DWaCqpiLQ5k6seHDJy6590oPXgeNU36m6AL2pZFrxlX-ni6P9ffYUdrmDrrTmGrWa-xBPiL409jR33BTH17OY
  priority: 102
  providerName: IEEE
Title Toward a Secure and Usable User Authentication Mechanism for Mobile Passenger ID Devices for Land/Sea Border Control
URI https://ieeexplore.ieee.org/document/9747935
https://www.proquest.com/docview/2652700795
https://doaj.org/article/ba0ed7d1150946408e001ed77389ca34
Volume 10
hasFullText 1
inHoldings 1
isFullTextHit
isPrint
link http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwrV09T8MwELUQEwyIT1EoyAMjURPHceoRCggQRUhQic06f0kMFNSW_8-dHVARAwtTpCRy4rvk_N75_MzYiRsChNrWhXZSFdJrW2grPAK5pkUwB7qqaXHy-F5dT-Ttc_O8tNUX1YRleeBsuIGFMvjWE3DRUslyGDCw4pkWR1oHdVYCrZolMpVi8LBSumk7maGq1IOz0Qh7hIRQCOSpiib8fgxFSbG_22LlV1xOg83VJtvoUCI_y2-3xVbCdJutL2kH7rDFUyp45cBTyjxwmHo-mdNKKDyEGafkF5UC5ZwcHwda4_syf-UIU_n4zWI44A8InamsdcZvLvhFSFEjXb_D1gaPAfh50ubko1zRvssmV5dPo-ui20KhcGiqRWF9cNFBKUF4i0gtyhiFtDV4JFqVs1oNfeOaqgVoqxhU6bUUgkTnhAQEC_UeW52-TcM-40hswFm0K0RiOS0oUrqxwkYbEVTFHjv9sqZ5z0oZJjGMUptsfEPGN53xe-ycLP59K8lcpxPofNM53_zl_B7bIX99N0LkSNfYdv_Lf6b7JedGqIYm2VvdHPzHow_ZGnUnZ2P6bHUx-whHiE8W9jh9isdpKeEnt9Xf2A
link.rule.ids 315,786,790,802,870,2115,4043,27954,27955,27956,55107
linkProvider Directory of Open Access Journals
linkToHtml http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwjV1LbxMxEB6Vcig98GhBBAr4wLGb7Hq96_jYplQpZCskEqk3y08JIRKUbC799cx4NxGvA6ddeR-y9fnxzXjmM8B7NzYmlLbMlBN1JryymbLcI5GrJJI5o4qSkpOb23q6EB_vqrsDON_nwoQQUvBZGNJt2sv3K7clV9mIuK8qqwfwENf5XHbZWnuPCh0hoSrZSwsVuRpdTCbYCjQCOUfbtKZNvt-Wn6TS3x-r8tdcnBaY6yfQ7KrWxZV8G25bO3T3f6g2_m_dn8Ljnmmyi65rPIODsDyBo10i8uYEjn_RIjyFdp4CaJlhyQUfmFl6tthQZhVewpqRM41CizofH2sC5Qx_3XxnSHtZs7I4vbDPSMUpTHbNbq7YVUizUHo-w7-NvgTDLpPWJ5t0EfLPYXH9YT6ZZv2RDJkT-bjNrA8uOpMLw71F5hdFjFzY0ng03ApnVT32lasKaYwsYqhzrwTnJGLHhUHyUb6Aw-VqGV4CQ0PJOIuYmUhWkzQ1KedYbqONSNLiAM53SOkfnfKGThZLrnQHrCZgdQ_sAC4Jzf2rJJudChAF3Y9CZAZ58NITC1aixhYFXKWxRCJtc6YUAzgl5PY_6UEbwNmub-h-iG80ryvatJeqevXvr97B0XTezPTs5vbTa3hEle18N2dw2K634Q2ymda-TZ34J9Cu8Do
openUrl ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.atitle=Toward+a+Secure+and+Usable+User+Authentication+Mechanism+for+Mobile+Passenger+ID+Devices+for+Land%2FSea+Border+Control&rft.jtitle=IEEE+access&rft.au=Papaioannou%2C+Maria&rft.au=Zachos%2C+Georgios&rft.au=Essop%2C+Ismael&rft.au=Mantas%2C+Georgios&rft.date=2022&rft.issn=2169-3536&rft.eissn=2169-3536&rft.volume=10&rft.spage=38832&rft.epage=38849&rft_id=info:doi/10.1109%2FACCESS.2022.3164245&rft.externalDBID=n%2Fa&rft.externalDocID=10_1109_ACCESS_2022_3164245
thumbnail_l http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/lc.gif&issn=2169-3536&client=summon
thumbnail_m http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/mc.gif&issn=2169-3536&client=summon
thumbnail_s http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/sc.gif&issn=2169-3536&client=summon