, Track 2
Rethink authentication with a secure, user-friendly password-less solution. Leveraging 3 technologies, it provides a frictionless experience without sacrificing security. Designed to address pain points of traditional password systems, this system enhances security while delivering a seamless UX
Passwords are a constant security vulnerability and source of frustration for users. This presentation will provide an in-depth technical overview of an innovative password-less authentication system that eliminates these issues entirely. Through rigorous research and development, this cutting-edge solution leverages steganography, behavioural and physiological biometrics and cryptographic techniques to provide a secure and seamless authentication experience without relying on passwords at all. Attendees will gain insights into the core technologies and authentication flows involved in this password-less approach.
The system has been meticulously designed with robust security principles in mind to uphold privacy, prevent unauthorised access, and mitigate attack vectors like replay, spoofing and man-in-the-middle attacks. Architectures for integrating this password-less authentication across web and mobile will be covered.
Security professionals, developers and technology leaders will find immense value in learning about this pioneering password-less system that offers a practical path forward for evolving authentication needs across industries and organisations. This technical deep dive aims to rethink secure user access for the modern era.
A pioneering researcher and lead developer in a password-less authentication system, this speaker brings expertise in authentication protocols, steganography, biometrics, and cryptography. Their postgraduate research has produced a cutting-edge password-less system, demonstrating a comprehensive understanding from concept to implementation.
Key achievements include:
- Conducting an in-depth study on password vulnerabilities and usability issues
- Prototyping and testing a password-less architectures for web and mobile platforms
- Implementing advanced security controls such as anti-replay mechanisms, liveness detection, and secure key storage
Their work has been published in the peer-reviewed Journal of Cyber Security and Privacy, solidifying their contribution to the field.