July 12, 2023, 1:10 a.m. | Vasilis Papaspirou, Leandros Maglaras, Ioanna Kantzavelou, Naghemeh Moradpoor, Sokratis Katsikas

cs.CR updates on arXiv.org arxiv.org

This paper extends and advances our recently introduced two-factor Honeytoken
authentication method by incorporating blockchain technology. This novel
approach strengthens the authentication method to prevent many attacks
including tampering attacks. Evaluation results show that integrating
blockchain into the Honeytoken method could improve performance and operational
efficiency.

attacks authentication blockchain efficiency evaluation factor novel operational operational efficiency performance results system tampering technology two factor

Enterprise Security Architect

@ Proofpoint | Utah

Senior Incident Response and Digital Forensics Engineer

@ Danske Bank | Vilnius, Lithuania

SOC Analyst (Remote)

@ Bertelsmann | New York City, US, 10019

Risk Consulting - Protect Tech - Staff - IT Compliance - ISO-NIST-FISMA-PCI DSS and Privacy

@ EY | Bengaluru, KA, IN, 560016

Security Officer Warrenpoint Harbour

@ TSS | Newry, County Down, United Kingdom

Senior DevSecOps Engineer

@ Scientific Systems Company, Inc. | Burlington, Massachusetts, United States