Adversary models for mobile device authentication

R Mayrhofer, S Sigg - ACM Computing Surveys (CSUR), 2021 - dl.acm.org
Mobile device authentication has been a highly active research topic for over 10 years, with
a vast range of methods proposed and analyzed. In related areas, such as secure channel …

[PDF][PDF] Adversary Models for Mobile Device Authentication

R MAYRHOFER, S SIGG - 2021 - digidow.eu
Mobile devices carry an increasing variety of personal data. For instance, recent proposals
to include electronic identities into smartphones to replace classical photo identification such …

[PDF][PDF] Adversary Models for Mobile Device Authentication

R MAYRHOFER, S SIGG - 2021 - mayrhofer.eu.org
Mobile devices carry an increasing variety of personal data. For instance, recent proposals
to include electronic identities into smartphones to replace classical photo identification such …

[PDF][PDF] Adversary Models for Mobile Device Authentication

R MAYRHOFER, S SIGG - 2021 - acris.aalto.fi
Mobile devices carry an increasing variety of personal data. For instance, recent proposals
to include electronic identities into smartphones to replace classical photo identification such …

Adversary Models for Mobile Device Authentication

R Mayrhofer, V Mohan, S Sigg - arXiv e-prints, 2020 - ui.adsabs.harvard.edu
Mobile device authentication has been a highly active research topic for over 10 years, with
a vast range of methods having been proposed and analyzed. In related areas such as …

Adversary Models for Mobile Device Authentication

R Mayrhofer, S Sigg - ACM Computing Surveys, 2022 - research.aalto.fi
Mobile device authentication has been a highly active research topic for over 10 years, with
a vast range of methods proposed and analyzed. In related areas, such as secure channel …

Adversary Models for Mobile Device Authentication

R Mayrhofer, V Mohan, S Sigg - arXiv preprint arXiv:2009.10150, 2020 - arxiv.org
Mobile device authentication has been a highly active research topic for over 10 years, with
a vast range of methods having been proposed and analyzed. In related areas such as …

[PDF][PDF] Adversary Models for Mobile Device Authentication

R MAYRHOFER, S SIGG - 2021 - scholar.archive.org
Mobile devices carry an increasing variety of personal data. For instance, recent proposals
to include electronic identities into smartphones to replace classical photo identification such …

Adversary Models for Mobile Device Authentication

R Mayrhofer, S Sigg - 2022 - aaltodoc.aalto.fi
Mobile device authentication has been a highly active research topic for over 10 years, with
a vast range of methods proposed and analyzed. In related areas, such as secure channel …

[PDF][PDF] Adversary Models for Mobile Device Authentication

R MAYRHOFER, V MOHAN, S SIGG - arXiv preprint arXiv …, 2020 - researchgate.net
1https://www. apple. com/ios/siri/2https://developer. amazon. com/alexa 3https://assistant.
google. com/4For D2D and D2U authentication, various factors and physical channels have …