Khairul Azmi Abu Bakar

  • Citations Per Year
Learn More
Authentication is a mechanism to establish proof of identities. Common practise for authentication is to challenge user to present authentication credential. User who can present the valid credential is considered as authenticated identity. Traditional authentication systems have a static security requirement which does not consider the change of user(More)
Internet of Things (IoT) rises as a powerful domain where embedded devices and sensors can connect and exchange information over the Internet. The importance of IoT devices and data can be critical, so security constraints are required to keep IoT data safe from intruders; authentication is one of basic and important means to confirm data privacy and(More)
Recently, Internet of Things (IoT) has become one of the most developing network environments. Enhancement in electronic and microcontrollers has resulted into increasing number of electric devices which are connected to the internet. Therefore, secure data exchange between IoT devices and other systems is required to prevent any attempts of attacks which(More)
Context-aware user authentication has become a necessary tool to serve as an additional security perimeter to protect online identities. By learning about user’s online behavior over time, authentication system are able to establish user behavior profile. Any substantial deviation on login context from the profile would indicate a high risk login attempt.(More)
  • 1