<!DOCTYPE article PUBLIC "-//NLM//DTD JATS (Z39.96) Journal Archiving and Interchange DTD v1.0 20120330//EN" "JATS-archivearticle1.dtd">
<article xmlns:xlink="http://www.w3.org/1999/xlink">
  <front>
    <journal-meta />
    <article-meta>
      <title-group>
        <article-title>Research of Authentication Methods in Mobile Applications</article-title>
      </title-group>
      <contrib-group>
        <contrib contrib-type="author">
          <string-name>Bohdan Oliinyk</string-name>
          <xref ref-type="aff" rid="aff1">1</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Yurii Shcheblanin</string-name>
          <xref ref-type="aff" rid="aff1">1</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Oleg Kurchenko</string-name>
          <xref ref-type="aff" rid="aff1">1</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Oleksandr Toroshanko</string-name>
          <email>toroshanko@gmail.com</email>
          <xref ref-type="aff" rid="aff1">1</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Nataliia Korshun</string-name>
          <email>n.korshun@kubg.edu.ua</email>
          <xref ref-type="aff" rid="aff0">0</xref>
        </contrib>
        <aff id="aff0">
          <label>0</label>
          <institution>Borys Grinchenko Kyiv University</institution>
          ,
          <addr-line>18/2 Bulvarno-Kudriavska str., Kyiv, 04053</addr-line>
          ,
          <country country="UA">Ukraine</country>
        </aff>
        <aff id="aff1">
          <label>1</label>
          <institution>Taras Shevchenko National University of Kyiv</institution>
          ,
          <addr-line>60 Volodymyrska str., Kyiv, 01601</addr-line>
          ,
          <country country="UA">Ukraine</country>
        </aff>
      </contrib-group>
      <fpage>266</fpage>
      <lpage>271</lpage>
      <abstract>
        <p>Today, most web applications use authentication methods that often rely on social media authentication or simple registration by entering a unique ID and password. When it comes to the use of social media authentication methods in large companies, these solutions are driven by their relative simplicity, speed, and reliability. It is commonly believed that their encryption algorithms and methods of transmitting authentication data are encapsulated and protected from hacking. However, the analysis shows that each method has its advantages and disadvantages. The paper considers somewhat non-standard and, in some cases, faster methods of user authentication in web applications by using the capabilities of the Android operating system and its server.</p>
      </abstract>
      <kwd-group>
        <kwd>1 Access control</kwd>
        <kwd>authentication</kwd>
        <kwd>biometrics</kwd>
        <kwd>continuous authentication</kwd>
        <kwd>cryptography</kwd>
        <kwd>cybersecurity</kwd>
        <kwd>cyber threats</kwd>
        <kwd>data privacy</kwd>
        <kwd>identity management</kwd>
      </kwd-group>
    </article-meta>
  </front>
  <body>
    <sec id="sec-1">
      <title>1. Introduction</title>
      <p>If we talk about authenticating a conditional
user in any system, from highly secure password
storage software (Bitwarden, 1Password, etc.) [1]
to a simple image editor [2], then usually, when
downloading, we see a window with the
possibility of choosing several authentication
methods: authenticate through a social network, or
using a phone number, email and, if necessary,
entering a password.</p>
      <p>In the first case, the user must have an account
in the selected social network through which
authentication will be performed [3].</p>
      <p>In the second case, the user needs to go from
entering his or her email to entering a password
twice.</p>
      <p>
        At first glance, this is not a complicated
procedure, but if we imagine a situation in which
several users want to have access to a conditional
password manager or even a photo editor library,
from a simple family that wants to share a
password to a platform where they study together,
or a company that uses a shared account in a
service that a large number of employees should
have access to, this causes certain technical
difficulties and risks [
        <xref ref-type="bibr" rid="ref4">4–7</xref>
        ].
2. Formulation of the Research Task
      </p>
      <p>In the cases considered, it would be nice if the
authentication system could quickly and with
minimal user action provide access to an existing
account. Some methods will use only the
capabilities of the Android operating system,
while other authentication methods will be
performed exclusively on the server.</p>
      <p>The server is a computer configured to respond
to messages from the application. It stores data,
processes it, searches for it in databases if
necessary, and issues it as a response to the
application’s request.</p>
      <p>Only the result of their execution with data that
the system can use to directly authenticate the user
will be returned to the phone.</p>
      <p>
        Consider the following authentication
methods [
        <xref ref-type="bibr" rid="ref5">8</xref>
        ]:
• User authentication by IP address.
•
•
code.
• User authentication using
Service Discovery (NSD) technology.
      </p>
      <sec id="sec-1-1">
        <title>User authentication using a QR code. User authentication using a connection</title>
      </sec>
      <sec id="sec-1-2">
        <title>Network</title>
        <p>3. Presentation of the Main Material</p>
        <p>For all authentication methods, we have the
following prerequisite:</p>
        <p>An account has been created in the system and
there is at least one user who is already
authenticated to this account.</p>
        <p>The task of the authentication system is to
ensure that another user successfully authenticates
to an existing account.</p>
        <p>1. Authentication by IP address</p>
        <p>This type of authentication can only be
performed on one device and is used to quickly
reenter an account if the user has previously logged
out. It is performed mainly with the help of a
server that will act as a kind of hub and will issue
authentication permissions based on the IP
address of the device and the encrypted token. The
device will only need to contact the server to get
permission to re-authenticate.</p>
        <p>
          If the user re-opens the application using the
same IP address within a certain period and the
server confirms his/her token, the device is
successfully authenticated. A possible scheme of
this process is shown in Fig. 1 [
          <xref ref-type="bibr" rid="ref6">9</xref>
          ]. Note: in the
diagram, one device is shown as two for ease of
perception.
• Essentially, on the device that we want to
authenticate in the system, we do not need to
force the user to take any action, the
application will poll the server and when it
receives confirmation that the device is
authenticated, we can give access to the
account.
• This system is characterized by the high
speed of the authentication process.
• Since it is possible to implement such a
system only using your server, you can note the
high level of reliability of this method.
        </p>
        <p>
          The disadvantages of this authentication
system are as follows:
• In some cases, the implementation of this
logic can be difficult.
• You need to have your server.
• Because the IP address of the device is
analyzed, there is a possibility to authenticate
the wrong device if the method is implemented
incorrectly.
• It cannot be said that this method is 100%
secure.
• Can only be used on a device that has
already been authenticated before.
• The authenticated device must be located
in the same IP address area.
2. User authentication using a QR code
To implement this authentication method, the
user must scan the provided code with any
available QR code scanner and be either near the
device on which it is generated or can scan it [
          <xref ref-type="bibr" rid="ref7">10</xref>
          ].
        </p>
        <p>The technical implementation of this
authentication method involves the
implementation of a QR code generation
procedure.</p>
        <p>
          The Android Studio IDE software [
          <xref ref-type="bibr" rid="ref8">11</xref>
          ], which
is used to develop applications for Android,
provides tools for generating a QR code, in the
context of this study we will not consider how to
create an application for generating a QR code,
this technology will be considered in the next
study.
        </p>
        <p>
          Let us consider how the system on which this
QR code is scanned understands that it is
necessary to authenticate the user and allow him
to enter the application [
          <xref ref-type="bibr" rid="ref9">12</xref>
          ].
        </p>
        <p>
          So, the system, when generating a QR code,
starts a procedure that accesses the server and
passes it certain parameters that will be required
to authenticate another client in this account. After
receiving these parameters, the server must return
a so-called Deeplink in its response [
          <xref ref-type="bibr" rid="ref10">13</xref>
          ].
        </p>
        <p>A Deeplink is a hyperlink that redirects the
user to a specific section of an application or
website. This feature reduces the number of
intermediate user actions and helps the user get to
the desired page in a minimum number of steps.</p>
        <p>
          Deeplink can [
          <xref ref-type="bibr" rid="ref11">14</xref>
          ]:
• Redirect the user to an application on a
smartphone rather than to a page in a browser,
where he or she will not be able to take any
action.
• Collect statistics on conversions and
visitors.
• Redirect the user directly to the desired
section on the site, not to the main page.
• Be indexed in search engines.
• Be easily embedded in QR codes.
        </p>
        <p>Fig. 2 shows a scheme that can be used for
authentication using a QR code.</p>
        <p>
          It is important to remember that the
implementation of Deeplink requires the use of a
special service to generate such a link and make it
work correctly, such as Google’s Firebase service
[
          <xref ref-type="bibr" rid="ref12">15</xref>
          ].
        </p>
        <p>
          Thus, we have a ready-made QR code with a
built-in Deeplink. On another client, you need to
scan the QR code, which will result in a certain
identifier by which we can contact the server and,
if it confirms the correctness of this identifier,
successfully authenticate the user to the account
[
          <xref ref-type="bibr" rid="ref13">16</xref>
          ].
        </p>
        <p>
          The advantages of this authentication method
are:
• The relative simplicity of
implementation, this method is quite common,
so there is a lot of documentation on its
implementation [
          <xref ref-type="bibr" rid="ref14">17</xref>
          ].
• Ability to use Deeplink, which greatly
simplifies the implementation of this method.
At the same time, the method has the following
disadvantages:
• Only those devices that have the technical
ability to scan a QR code and analyze it can
authenticate to the system.
• The authentication process requires the
use of third-party servers, albeit reliable ones.
If, for example, Google Firebase is unavailable
or has some other errors, the entire
authentication.
• Logic will stop working and nothing can
be done about it.
• Requires additional actions from the user,
which is a disadvantage, although not a
significant one, as some other methods will
make this process much easier.
3. Authentication using the connection code
This authentication method is implemented as
follows [
          <xref ref-type="bibr" rid="ref15">18</xref>
          ].
        </p>
        <p>
          A code is generated on the server that can
consist of numbers, letters, or a combination of
both. The code can also have an arbitrary length
and, optionally, an expiration date [
          <xref ref-type="bibr" rid="ref16">19</xref>
          ].
        </p>
        <p>Device A: initiates a request to the server. If
we describe the algorithm in simple terms, it will
look like this: “Generate a code and send it to me
in response to this request.” After that, it is
possible to display this code on the device screen
and ask the user to enter it on another device.</p>
        <p>
          Device B performs the following actions:
enters the code in the appropriate window, then
encrypts it with the most convenient and possible
encryption method (for example, SHA-256 using
salt) and sends its hash to the server [
          <xref ref-type="bibr" rid="ref17">20</xref>
          ].
        </p>
        <p>The server, in turn, processes the encrypted
code sent to it, decodes it, checks whether it
matches the code generated by the same server
earlier, and if it does, it sends a response to
Device B.</p>
        <p>After receiving confirmation from the server,
we can successfully authenticate the user (Device
B) to the account.</p>
        <p>
          A diagram of the implementation of this
authentication method is shown in Fig. 3 [
          <xref ref-type="bibr" rid="ref18">21</xref>
          ].
The advantages of this method are [
          <xref ref-type="bibr" rid="ref19">22</xref>
          ]:
• High convenience. The authentication
code can be sent to any device, it will be valid
at any distance and does not require the device
we want to authenticate to be nearby [
          <xref ref-type="bibr" rid="ref20">23</xref>
          ].
• A sufficiently high level of security and
fault tolerance of the authentication system is
achieved by using an in-house developed and
administered authentication server [
          <xref ref-type="bibr" rid="ref21">24</xref>
          ].
• The flexibility of implementation, the
logic can be edited to suit your needs, for
example, the same code parameters, its
appearance, validity, length, etc., which makes
it possible to use this authentication method in
different systems with different security
requirements [
          <xref ref-type="bibr" rid="ref22">25</xref>
          ].
        </p>
        <p>
          The disadvantages of the method are that:
• The implementation of the method
requires the use and administration of its
server.
• Physically, the user has to go through
more steps in the authentication process.
Compared to other methods, the user needs to:
send the code if there is no physical access to
the device on which it was generated, and enter
the code through the input device. Also, the
possibility of an error in the process of entering
the authentication code by the user cannot be
ruled out. At the same time, this method is the
most convenient and secure if there is a large
distance between the devices [
          <xref ref-type="bibr" rid="ref23">26</xref>
          ].
        </p>
        <p>4. Authentication using Network Service
Discovery (NSD) technology</p>
        <p>First, you need to analyze the NSD technology
itself, its features, and how it works.</p>
        <p>
          So, the Network Service Discovery (NSD)
function provides the application with access to
services provided by other devices on the local
network. Devices that support the NSD function
include printers, webcams, HTTPS servers, and
other mobile devices [
          <xref ref-type="bibr" rid="ref24">27</xref>
          ].
        </p>
        <p>NSD implements a mechanism for searching
for services based on DNS-SD.</p>
        <p>DNS-SD allows your application to request
services by specifying the type of service and the
ID of the device that provides the desired type of
service.</p>
        <p>DNS-SD is supported on both Android and
other mobile platforms.</p>
        <p>
          To start the implementation on an
authenticated device, we will need to register a
special service on the network using an IP address
and port. As an example, we can use the following
method of use: over this network, we can transmit
the so-called JSON [
          <xref ref-type="bibr" rid="ref25">28</xref>
          ] in which we can transfer
any data to another device, in this case, for
authentication, we can transmit an encrypted key.
The other device that we need to authenticate will
need to detect this service, determine the data we
have transmitted and decrypt the key. After all the
necessary steps, we can successfully authenticate
the user. The scheme of this method is shown in
Fig. 4.
        </p>
        <p>
          Advantages of this method [
          <xref ref-type="bibr" rid="ref26">29</xref>
          ]:
• Ease of implementation, the NSD library
is bundled with the Android Studio IDE
software, and there is also official,
welldescribed documentation on the website.
• Speed, if we have two devices in the same
local network, we can automatically
authenticate the user, no additional actions are
required from the user.
• The ability to authenticate without the
participation of the server.
• The ability to authenticate without access
to the Internet.
        </p>
        <p>The disadvantages include:
• The presence of a local network, makes it
impossible to use this method for devices that
are outside of it.
• Reliability is not guaranteed, messages
may be lost and, as a result, authentication will
not take place.
• The use of multicast traffic, which may
lead to a greater discharge of mobile device
batteries.
• The possibility of unauthorized access to
authentication data that may be locally cached.</p>
      </sec>
    </sec>
    <sec id="sec-2">
      <title>4. Conclusions</title>
      <p>
        The study has shown that there are many
nonstandard, interesting, and effective methods of
user (device) authentication, in addition to those
that are currently most common. The tendency to
use social networks as an authentication method
and enter a password and identifier is dictated by
large companies that have large computing
resources and can determine which authentication
method the user is most likely to use to access the
application [
        <xref ref-type="bibr" rid="ref20">23</xref>
        ]. In most cases, this method of
authentication can be considered the most reliable
due to the high security of the company itself [
        <xref ref-type="bibr" rid="ref21">24</xref>
        ].
      </p>
      <p>However, such solutions may not always
ensure the confidentiality, integrity, and
availability of user data. It is worth recalling the
process of registration in such popular networks
as Instagram, Facebook, etc., where two-factor
authentication technology was out of the question
a couple of years ago.</p>
      <p>In this paper, we have considered the methods
of user authentication by IP address, using a QR
code, using a connection code, and Network
service discovery technology. Each of these
methods is unique and has its specifics of
implementation and the corresponding level of
security, so it is not appropriate to say that one is
better and one is worse.</p>
      <p>The method of user authentication should be
chosen taking into account the technology of
operation and security requirements of the system
in which the user (device) must be authorized.</p>
      <p>If we talk about choosing a specific
authentication method, we can consider the
following cases as an example. To develop an
application that should work locally or devices
that will be authenticated will be located nearby,
it will be convenient to use NSD and a QR
authorization code, depending on the security
requirements, you can choose between a more
secure QR code and a less secure NSD. As an
example, applications such as Walkie-talkie or
Zello can serve as a good example, if you want to
provide similar functionality to these, these
authentication methods will be the best choice.</p>
      <p>If you are developing an application whose
user can have several options for authentication
and, accordingly, have different implementations,
you can use IP address authentication.</p>
      <p>In general, there are many examples of the
implementation of different authentication
methods, the main thing is that their use can be
different, up to the fact that you can implement
authentication using all methods, it all depends on
the specific goals that will be set.
5. References
[1]
[2]
[3]
[4]
[5]
[6]</p>
    </sec>
  </body>
  <back>
    <ref-list>
      <ref id="ref1">
        <mixed-citation>
          <string-name>
            <given-names>D.</given-names>
            <surname>Berestov</surname>
          </string-name>
          , et al.
          <article-title>Analysis of Features and Prospects of Application of Dynamic Iterative Assessment of Information Security Risks</article-title>
          .
          <source>CEUR Workshop</source>
          ,
          <volume>2923</volume>
          (
          <year>2021</year>
          )
          <fpage>329</fpage>
          -
          <lpage>335</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref2">
        <mixed-citation>
          <string-name>
            <given-names>Google</given-names>
            <surname>Developers</surname>
          </string-name>
          , I Want to Encrypt Data,
          <year>2021</year>
          . URL: https://developers.google.com/tin k/encrypt-data
        </mixed-citation>
      </ref>
      <ref id="ref3">
        <mixed-citation>
          <string-name>
            <given-names>L.</given-names>
            <surname>Ho</surname>
          </string-name>
          ,
          <string-name>
            <given-names>N.</given-names>
            <surname>Katuk</surname>
          </string-name>
          ,
          <article-title>Social Login with Oauth for Mobile Applications: User's View</article-title>
          ,
          <source>IEEE Symposium on Computer Applications &amp; Industrial Electronics (ISCAIE)</source>
          ,
          <year>2016</year>
          . doi:
          <volume>10</volume>
          .1109/ISCAIE.
          <year>2016</year>
          .7575043
          <string-name>
            <given-names>Z.</given-names>
            <surname>Hu</surname>
          </string-name>
          , et al.,
          <source>Authentication System by Human Brainwaves Using Machine Learning and Artificial Intelligence</source>
          , in: Advances in Computer Science for Engineering and
          <string-name>
            <surname>Education IV</surname>
          </string-name>
          (
          <year>2021</year>
          )
          <fpage>374</fpage>
          -
          <lpage>388</lpage>
          . doi:
          <volume>10</volume>
          .1007/978-3-
          <fpage>030</fpage>
          -80472-5_31
          <string-name>
            <given-names>Z.</given-names>
            <surname>Hu</surname>
          </string-name>
          , et al.,
          <article-title>High-Speed and Secure PRNG for Cryptographic Applications</article-title>
          ,
          <source>International Journal of Computer Network and Information Security</source>
          <volume>12</volume>
          (
          <issue>3</issue>
          ) (
          <year>2020</year>
          )
          <fpage>1</fpage>
          -
          <lpage>10</lpage>
          . doi:
          <volume>10</volume>
          .5815/ijcnis.
          <year>2020</year>
          .
          <volume>03</volume>
          .01
          <string-name>
            <given-names>M.</given-names>
            <surname>TajDini</surname>
          </string-name>
          , et al.,
          <source>Wireless Sensors for Brain Activity-A Survey, Electronics</source>
          <volume>9</volume>
          (
          <issue>12</issue>
          ), iss.
          <source>2092</source>
          (
          <year>2020</year>
          )
          <fpage>1</fpage>
          -
          <lpage>26</lpage>
          . doi:
          <volume>10</volume>
          .3390/electronics9122092
        </mixed-citation>
      </ref>
      <ref id="ref4">
        <mixed-citation>
          [7]
          <string-name>
            <given-names>M.</given-names>
            <surname>TajDini</surname>
          </string-name>
          , et al.,
          <source>Brainwave-based Authentication using Features Fusion, Comput. Secur</source>
          .
          <volume>129</volume>
          , no.
          <volume>103198</volume>
          (
          <year>2023</year>
          )
          <fpage>1</fpage>
          -
          <lpage>11</lpage>
          . doi:
          <volume>10</volume>
          .1016/j.cose.
          <year>2023</year>
          .103198
        </mixed-citation>
      </ref>
      <ref id="ref5">
        <mixed-citation>
          [8] Top 10
          <string-name>
            <given-names>Web</given-names>
            <surname>Application Security Risks</surname>
          </string-name>
          , URL: https://owasp.org/www-project-topten/
        </mixed-citation>
      </ref>
      <ref id="ref6">
        <mixed-citation>
          [9]
          <string-name>
            <given-names>K.</given-names>
            <surname>Kang</surname>
          </string-name>
          , et al.,
          <article-title>Android Phone as Wireless USB Storage Device Through USB/IP Connection</article-title>
          ,
          <source>IEEE International Conference on Consumer Electronics (ICCE)</source>
          ,
          <year>January 2011</year>
          . doi:
          <volume>10</volume>
          .1109/ICCE.
          <year>2011</year>
          .5722588
        </mixed-citation>
      </ref>
      <ref id="ref7">
        <mixed-citation>
          [10]
          <article-title>What is Android Studio</article-title>
          , URL: https://developer.android.com/studio/intro
        </mixed-citation>
      </ref>
      <ref id="ref8">
        <mixed-citation>
          [11]
          <article-title>What is Deep Linking</article-title>
          , URL: https://www.appsflyer.com/resources/guid es/deep-linking-
          <volume>101</volume>
          /
        </mixed-citation>
      </ref>
      <ref id="ref9">
        <mixed-citation>
          [12]
          <article-title>Guide to Mobile Application Deep Linking</article-title>
          , URL: https://appinventiv.com/blog/mobile -application
          <string-name>
            <surname>-</surname>
          </string-name>
          deep-linking/
        </mixed-citation>
      </ref>
      <ref id="ref10">
        <mixed-citation>
          [13]
          <string-name>
            <given-names>L.</given-names>
            <surname>Moroney</surname>
          </string-name>
          ,
          <article-title>The Definitive Guide to Firebase, Build Android Apps on Google's Mobile Platform</article-title>
          ,
          <year>January 2017</year>
          doi:10.1007/978-1-
          <fpage>4842</fpage>
          -2943-9.
        </mixed-citation>
      </ref>
      <ref id="ref11">
        <mixed-citation>
          [14]
          <string-name>
            <given-names>S.</given-names>
            <surname>Boonkrong</surname>
          </string-name>
          ,
          <article-title>Authentication and Access Control: Practical Cryptography Methods</article-title>
          and Tools, Apress; 1st ed. Edition,
          <year>December 2020</year>
          . doi:
          <volume>10</volume>
          .1007/978-1-
          <fpage>4842</fpage>
          - 6570-3
        </mixed-citation>
      </ref>
      <ref id="ref12">
        <mixed-citation>
          [15]
          <string-name>
            <given-names>J.</given-names>
            <surname>Picolet</surname>
          </string-name>
          , Hash Crack:
          <article-title>Password Cracking Manual (</article-title>
          <year>v3</year>
          ),
          <year>January 2019</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref13">
        <mixed-citation>
          [16]
          <string-name>
            <given-names>P.</given-names>
            <surname>Vyshnavi. P. Tamil</surname>
          </string-name>
          <string-name>
            <surname>Selvi</surname>
          </string-name>
          ,
          <string-name>
            <given-names>R.</given-names>
            <surname>Gandhiraj</surname>
          </string-name>
          ,
          <article-title>Android App for Arithmetic Encoding</article-title>
          and Decoding,
          <source>International Conference on Communication and Signal Processing</source>
          ,
          <year>2016</year>
          . doi:
          <volume>10</volume>
          .1109/ICCSP.
          <year>2016</year>
          .7754241
        </mixed-citation>
      </ref>
      <ref id="ref14">
        <mixed-citation>
          [17]
          <string-name>
            <given-names>S.P.</given-names>
            <surname>Singh</surname>
          </string-name>
          , SHA Algorithms-Traditional and
          <article-title>New secure</article-title>
          , efficient Algorithm: Cryptography, Security,
          <year>August 2021</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref15">
        <mixed-citation>
          [18]
          <string-name>
            <given-names>C.</given-names>
            <surname>Xu</surname>
          </string-name>
          ,
          <string-name>
            <given-names>W.</given-names>
            <surname>Wei</surname>
          </string-name>
          ,
          <string-name>
            <given-names>S.</given-names>
            <surname>Zheng</surname>
          </string-name>
          ,
          <article-title>Efficient Mobile RFID Authentication Protocol for Smart Logistics Targets Tracking</article-title>
          , IEEE Access PP,
          <volume>11</volume>
          , (
          <year>2023</year>
          )
          <fpage>4322</fpage>
          -
          <lpage>4336</lpage>
          . doi:
          <volume>10</volume>
          .1109/ACCESS.
          <year>2023</year>
          .3234959
        </mixed-citation>
      </ref>
      <ref id="ref16">
        <mixed-citation>
          [19]
          <string-name>
            <given-names>A.</given-names>
            <surname>Abd El-Aziz</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A.</given-names>
            <surname>Kannan</surname>
          </string-name>
          , JSON Encryption, International Conference on Computer Communication and Informatics,
          <year>January 2014</year>
          . doi:
          <volume>10</volume>
          .1109/ICCCI.
          <year>2014</year>
          .6921719
        </mixed-citation>
      </ref>
      <ref id="ref17">
        <mixed-citation>
          [20]
          <string-name>
            <given-names>J.</given-names>
            <surname>Jeong</surname>
          </string-name>
          ,
          <string-name>
            <given-names>J.</given-names>
            <surname>Park</surname>
          </string-name>
          , H. Kim,
          <source>Service Discovery Based On Multicast DNS in Ipv6 Mobile Ad-Hoc Networks, 57th IEEE Semiannual Vehicular Technology Conference</source>
          ,
          <year>April 2003</year>
          . doi:
          <volume>10</volume>
          .1109/VETECS.
          <year>2003</year>
          .1207126
        </mixed-citation>
      </ref>
      <ref id="ref18">
        <mixed-citation>
          [21]
          <string-name>
            <given-names>S.</given-names>
            <surname>Kulibaba</surname>
          </string-name>
          ,
          <article-title>Advanced Communication Model with the Voice Control and the Increased Security Level</article-title>
          , CEUR Workshop,
          <volume>3288</volume>
          (
          <year>2022</year>
          )
          <fpage>64</fpage>
          -
          <lpage>72</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref19">
        <mixed-citation>
          [22]
          <string-name>
            <given-names>P.</given-names>
            <surname>Sun</surname>
          </string-name>
          ,
          <article-title>Privacy Protection and Data Security in Cloud Computing: A Survey, Challenges, and Solutions</article-title>
          , IEEE Access,
          <volume>7</volume>
          (
          <year>2019</year>
          )
          <fpage>147420</fpage>
          -
          <lpage>147452</lpage>
          . doi:
          <volume>10</volume>
          .1109/ACCESS.
          <year>2019</year>
          .2946185
        </mixed-citation>
      </ref>
      <ref id="ref20">
        <mixed-citation>
          [23]
          <string-name>
            <given-names>A.</given-names>
            <surname>Mantelero</surname>
          </string-name>
          ,
          <article-title>The Future of Data Protection: Gold Standard vs</article-title>
          .
          <source>Global Standard, Comput. Law Secur. Rev</source>
          .
          <volume>40</volume>
          (
          <issue>105500</issue>
          ) (
          <year>2021</year>
          ). doi:
          <volume>10</volume>
          .1016/j.clsr.
          <year>2020</year>
          .105500
        </mixed-citation>
      </ref>
      <ref id="ref21">
        <mixed-citation>
          [24]
          <string-name>
            <given-names>The</given-names>
            <surname>White</surname>
          </string-name>
          <string-name>
            <surname>House</surname>
          </string-name>
          ,
          <source>Executive Order 14028, Improving the Nation's Cybersecurity</source>
          ,
          <year>2021</year>
          . URL: https://www.whitehouse.gov/briefingroom/presidentialactions/2021/05/12/executive-order
          <article-title>-onimproving-the-nations-cybersecurity</article-title>
        </mixed-citation>
      </ref>
      <ref id="ref22">
        <mixed-citation>
          [25]
          <string-name>
            <given-names>S.</given-names>
            <surname>Rao</surname>
          </string-name>
          , et al.,
          <source>The AES-256 Cryptosystem Resists Quantum Attacks. Int. J. Adv. Res. Comput. Sci. 8</source>
          (
          <year>2017</year>
          )
          <fpage>404</fpage>
          -
          <lpage>408</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref23">
        <mixed-citation>
          [26]
          <string-name>
            <given-names>A.</given-names>
            <surname>Younis</surname>
          </string-name>
          ,
          <string-name>
            <given-names>K.</given-names>
            <surname>Kifayat</surname>
          </string-name>
          ,
          <string-name>
            <given-names>M.</given-names>
            <surname>Merabti</surname>
          </string-name>
          ,
          <article-title>An Access Control Model for Cloud Computing</article-title>
          ,
          <string-name>
            <given-names>J.</given-names>
            <surname>Inf</surname>
          </string-name>
          .
          <source>Secur. Appl</source>
          .
          <volume>19</volume>
          (
          <issue>1</issue>
          ) (
          <year>2014</year>
          )
          <fpage>45</fpage>
          -
          <lpage>60</lpage>
          . doi:
          <volume>10</volume>
          .1016/j.jisa.
          <year>2014</year>
          .
          <volume>04</volume>
          .003
        </mixed-citation>
      </ref>
      <ref id="ref24">
        <mixed-citation>
          [27]
          <string-name>
            <given-names>Z.</given-names>
            <surname>Durumeric</surname>
          </string-name>
          et al.,
          <source>Neither Snow nor Rain nor MITM…: An Empirical Analysis of Email Delivery Security</source>
          , 2015 Internet Measurement Conference, New York,
          <year>2015</year>
          ,
          <fpage>27</fpage>
          -
          <lpage>39</lpage>
          . doi:
          <volume>10</volume>
          .1145/2815675.2815695
        </mixed-citation>
      </ref>
      <ref id="ref25">
        <mixed-citation>
          [28]
          <string-name>
            <given-names>J.</given-names>
            <surname>Chen</surname>
          </string-name>
          ,
          <string-name>
            <given-names>V.</given-names>
            <surname>Paxson</surname>
          </string-name>
          ,
          <string-name>
            <given-names>J.</given-names>
            <surname>Jiang</surname>
          </string-name>
          ,
          <source>Composition Kills: A Case Study of Email Sender Authentication</source>
          ,
          <year>2020</year>
          ,
          <volume>18</volume>
          .
        </mixed-citation>
      </ref>
      <ref id="ref26">
        <mixed-citation>
          [29]
          <string-name>
            <given-names>M.</given-names>
            <surname>Haider</surname>
          </string-name>
          ,
          <string-name>
            <given-names>H.</given-names>
            <surname>Mohammed</surname>
          </string-name>
          , A Survey of Email Service; Attacks,
          <string-name>
            <given-names>Security</given-names>
            <surname>Methods</surname>
          </string-name>
          and Protocols,
          <source>Int. J. Comput. Appl</source>
          .
          <volume>162</volume>
          (
          <year>2017</year>
          )
          <fpage>31</fpage>
          -
          <lpage>40</lpage>
          . doi:
          <volume>10</volume>
          .5120/ijca2017913417
        </mixed-citation>
      </ref>
    </ref-list>
  </back>
</article>