<?xml version="1.0" encoding="UTF-8"?>
<urlset xmlns="http://www.sitemaps.org/schemas/sitemap/0.9" generatedBy="WIX">
<url>
<loc>https://www.securifyidentity.com/research-papers/graphical-passwords-as-browser-extension%3A-implementation-and-usability-study</loc>
<lastmod>2023-03-11</lastmod>
</url>
<url>
<loc>https://www.securifyidentity.com/research-papers/towards-usable-solutions-to-graphical-password-hotspot-problem</loc>
<lastmod>2023-03-11</lastmod>
</url>
<url>
<loc>https://www.securifyidentity.com/research-papers/a-multi-word-password-proposal-(gridword)-and-exploring-questions-about-science-in-security-research-and-usable-security-evaluation</loc>
<lastmod>2023-03-11</lastmod>
</url>
<url>
<loc>https://www.securifyidentity.com/research-papers/johnny-in-internet-caf%C3%A9%3A-user-study-and-exploration-of-password-autocomplete-in-web-browsers</loc>
<lastmod>2023-03-11</lastmod>
</url>
<url>
<loc>https://www.securifyidentity.com/research-papers/exploration-and-field-study-of-a-password-manager-using-icon-based-passwords</loc>
<lastmod>2023-03-11</lastmod>
</url>
<url>
<loc>https://www.securifyidentity.com/research-papers/a-second-look-at-the-performance-of-neural-networks-for-keystroke-dynamics-using-a-publicly-available-dataset</loc>
<lastmod>2023-03-11</lastmod>
</url>
<url>
<loc>https://www.securifyidentity.com/research-papers/lake%3A-a-server-side-authenticated-key-establishment-with-low-computational-workload</loc>
<lastmod>2023-03-11</lastmod>
</url>
<url>
<loc>https://www.securifyidentity.com/research-papers/revisiting-graphical-passwords-for-augmenting%2C-not-replacing%2C-text-passwords</loc>
<lastmod>2023-03-11</lastmod>
</url>
<url>
<loc>https://www.securifyidentity.com/research-papers/mobile-authentication-secure-against-man-in-the-middle-attacks</loc>
<lastmod>2023-03-11</lastmod>
</url>
<url>
<loc>https://www.securifyidentity.com/research-papers/trust-in-the-middle%3A-towards-establishing-trustworthiness-of-authentication-proxies-using-trusted-computing</loc>
<lastmod>2023-03-11</lastmod>
</url>
<url>
<loc>https://www.securifyidentity.com/research-papers/charpattern%3A-rethinking-android-lock-pattern-to-adapt-to-remote-authentication</loc>
<lastmod>2023-03-25</lastmod>
</url>
<url>
<loc>https://www.securifyidentity.com/research-papers/could-we-distinguish-child-users-from-adults-using-keystroke-dynamics%3F</loc>
<lastmod>2023-03-11</lastmod>
</url>
<url>
<loc>https://www.securifyidentity.com/research-papers/twincloud%3A-secure-cloud-sharing-without-explicit-key-management</loc>
<lastmod>2023-03-17</lastmod>
</url>
<url>
<loc>https://www.securifyidentity.com/research-papers/a-quantitative-cvss-based-cyber-security-risk-assessment-methodology-for-it-systems</loc>
<lastmod>2023-03-11</lastmod>
</url>
<url>
<loc>https://www.securifyidentity.com/research-papers/open-tee-is-no-longer-virtual%3A-towards-software-only-trusted-execution-environments-using-white-box-cryptography</loc>
<lastmod>2023-03-11</lastmod>
</url>
<url>
<loc>https://www.securifyidentity.com/research-papers/using-attribute-based-feature-selection-approaches-and-machine-learning-algorithms-for-detecting-fraudulent-website-urls</loc>
<lastmod>2023-03-11</lastmod>
</url>
<url>
<loc>https://www.securifyidentity.com/research-papers/analysis-and-evaluation-of-keystroke-dynamics-as-a-feature-of-contextual-authentication</loc>
<lastmod>2023-03-11</lastmod>
</url>
<url>
<loc>https://www.securifyidentity.com/research-papers/security-analysis-of-mobile-authenticator-applications</loc>
<lastmod>2023-03-11</lastmod>
</url>
<url>
<loc>https://www.securifyidentity.com/research-papers/extending-attribute-based-access-control-model-with-authentication-information-for-internet-of-things</loc>
<lastmod>2023-03-11</lastmod>
</url>
<url>
<loc>https://www.securifyidentity.com/research-papers/white-box-implementations-for-hash-based-signatures-and-one-time-passwords</loc>
<lastmod>2023-03-11</lastmod>
</url>
<url>
<loc>https://www.securifyidentity.com/research-papers/towards-zero-trust%3A-the-design-and-implementation-of-a-secure-end-point-device-for-remote-working</loc>
<lastmod>2023-03-11</lastmod>
</url>
<url>
<loc>https://www.securifyidentity.com/research-papers/is-fido2-passwordless-authentication-a-hype-or-for-real%3F%3A-a-position-paper</loc>
<lastmod>2023-03-11</lastmod>
</url>
<url>
<loc>https://www.securifyidentity.com/research-papers/authentication-enabled-attribute-based-access-control-for-smart-homes-</loc>
<lastmod>2023-03-11</lastmod>
</url>
</urlset>