Demystifying authentication concepts in smartphones: Ways and types to secure access
Smartphones are the most popular and widespread personal devices. Apart from their
conventional use, that is, calling and texting, they have also been used to perform multiple …
conventional use, that is, calling and texting, they have also been used to perform multiple …
[PDF][PDF] Modern authentication techniques in smart phones: Security and usability perspective
U Shafique, H Khan, S Waqar, A Sher… - … International Journal of …, 2017 - academia.edu
A smartphone has more advanced computing ability and connectivity than basic featured
phones. Presently, we are moving from the Internet society to a mobile society where more …
phones. Presently, we are moving from the Internet society to a mobile society where more …
Is secure and usable smartphone authentication asking too much?
A De Luca, J Lindqvist - Computer, 2015 - ieeexplore.ieee.org
Is secure and usable smartphone authentication asking too much? Page 1 64 COMPUTER
PUBLISHED BY THE IEEE COMPUTER SOCIETY 0018-9162/15/$31.00 © 2015 IEEE …
PUBLISHED BY THE IEEE COMPUTER SOCIETY 0018-9162/15/$31.00 © 2015 IEEE …
“My smartphone is a safe!” The user's point of view regarding novel authentication methods and gradual security levels on smartphones
T Dörflinger, A Voth, J Krämer… - … conference on security …, 2010 - ieeexplore.ieee.org
This paper addresses laboratory tests regarding a graded security system on smartphones
based on novel authentication methods. The main scope of this paper is the user's …
based on novel authentication methods. The main scope of this paper is the user's …
Mobile biometrics: Towards a comprehensive evaluation methodology
Smartphones have become the pervasive personal computing platform. Recent years thus
have witnessed exponential growth in research and development for secure and usable …
have witnessed exponential growth in research and development for secure and usable …
MMAuth: A continuous authentication framework on smartphones using multiple modalities
Z Shen, S Li, X Zhao, J Zou - IEEE Transactions on Information …, 2022 - ieeexplore.ieee.org
With the wide use of smartphones, more private data are collected and saved in the
smartphones. This raises higher requirements for secure and effective user authentication …
smartphones. This raises higher requirements for secure and effective user authentication …
Duth: a user‐friendly dual‐factor authentication for Android smartphone devices
With the pervasiveness of smartphones and the richness of mobile apps, many people are
storing increasingly sensitive data on them, in greater quantities. In order to protect this …
storing increasingly sensitive data on them, in greater quantities. In order to protect this …
User authentication on mobile devices: Approaches, threats and trends
Mobile devices have brought a great convenience to us these years, which allow the users
to enjoy the anytime and anywhere various applications such as the online shopping …
to enjoy the anytime and anywhere various applications such as the online shopping …
Biometric and traditional mobile authentication techniques: Overviews and open issues
R Amin, T Gaber, G ElTaweel… - Bio-inspiring cyber security …, 2014 - Springer
Currently, mobile smartphone devices contain a critical and sensitive data. In addition, they
provide access to other data, on cloud for example, and to services somewhere on the …
provide access to other data, on cloud for example, and to services somewhere on the …
[HTML][HTML] Sensor-Based Authentication in Smartphone; a Systematic Review
With the widespread usage of smartphones, users not just using their smartphone for calls
and messaging only, but they are using it for a variety of purposes such as banking …
and messaging only, but they are using it for a variety of purposes such as banking …