Investigation areas

Attack and defence against threats

Identity management

Interaction with the user: usability

Lines of investigation

Access control based on behaviour

Biometric authentication

Facial recognition

Identity theft

Online fraud

Usability of authentication systems

Usability of security mechanisms