Demystifying authentication concepts in smartphones: Ways and types to secure access

S Gupta, A Buriro, B Crispo - Mobile Information Systems, 2018 - Wiley Online Library
Smartphones are the most popular and widespread personal devices. Apart from their
conventional use, that is, calling and texting, they have also been used to perform multiple …

[PDF][PDF] Modern authentication techniques in smart phones: Security and usability perspective

U Shafique, H Khan, S Waqar, A Sher… - … International Journal of …, 2017 - academia.edu
A smartphone has more advanced computing ability and connectivity than basic featured
phones. Presently, we are moving from the Internet society to a mobile society where more …

Is secure and usable smartphone authentication asking too much?

A De Luca, J Lindqvist - Computer, 2015 - ieeexplore.ieee.org
Is secure and usable smartphone authentication asking too much? Page 1 64 COMPUTER
PUBLISHED BY THE IEEE COMPUTER SOCIETY 0018-9162/15/$31.00 © 2015 IEEE …

“My smartphone is a safe!” The user's point of view regarding novel authentication methods and gradual security levels on smartphones

T Dörflinger, A Voth, J Krämer… - … conference on security …, 2010 - ieeexplore.ieee.org
This paper addresses laboratory tests regarding a graded security system on smartphones
based on novel authentication methods. The main scope of this paper is the user's …

Mobile biometrics: Towards a comprehensive evaluation methodology

A Buriro, Z Akhtar, B Crispo… - … Carnahan Conference on …, 2017 - ieeexplore.ieee.org
Smartphones have become the pervasive personal computing platform. Recent years thus
have witnessed exponential growth in research and development for secure and usable …

MMAuth: A continuous authentication framework on smartphones using multiple modalities

Z Shen, S Li, X Zhao, J Zou - IEEE Transactions on Information …, 2022 - ieeexplore.ieee.org
With the wide use of smartphones, more private data are collected and saved in the
smartphones. This raises higher requirements for secure and effective user authentication …

Duth: a user‐friendly dual‐factor authentication for Android smartphone devices

H Zhu, X Lin, Y Zhang, R Lu - Security and Communication …, 2015 - Wiley Online Library
With the pervasiveness of smartphones and the richness of mobile apps, many people are
storing increasingly sensitive data on them, in greater quantities. In order to protect this …

User authentication on mobile devices: Approaches, threats and trends

C Wang, Y Wang, Y Chen, H Liu, J Liu - Computer Networks, 2020 - Elsevier
Mobile devices have brought a great convenience to us these years, which allow the users
to enjoy the anytime and anywhere various applications such as the online shopping …

Biometric and traditional mobile authentication techniques: Overviews and open issues

R Amin, T Gaber, G ElTaweel… - Bio-inspiring cyber security …, 2014 - Springer
Currently, mobile smartphone devices contain a critical and sensitive data. In addition, they
provide access to other data, on cloud for example, and to services somewhere on the …

[HTML][HTML] Sensor-Based Authentication in Smartphone; a Systematic Review

ML Shuwandy, AS Jouda, MA Ahmed, MM Salih… - Journal of Engineering …, 2024 - Elsevier
With the widespread usage of smartphones, users not just using their smartphone for calls
and messaging only, but they are using it for a variety of purposes such as banking …