[go: up one dir, main page]

Alshammari et al., 2015 - Google Patents

Exploring the adoption of physical security controls in smartphones

Alshammari et al., 2015

View PDF
Document ID
8641722000214094811
Author
Alshammari N
Mylonas A
Sedky M
Champion J
Bauer C
Publication year
Publication venue
International Conference on Human Aspects of Information Security, Privacy, and Trust

External Links

Snippet

The proliferation of smartphones has changed our life due to the enhanced connectivity, increased storage capacity and innovative functionality they offer. Their increased popularity has drawn the attention of attackers, thus, nowadays their users are exposed to many …
Continue reading at www.researchgate.net (PDF) (other versions)

Similar Documents

Publication Publication Date Title
US11238139B2 (en) Methods for securely storing sensitive data on mobile device
Chanajitt et al. Forensic analysis and security assessment of Android m-banking apps
US11140155B2 (en) Methods, computer readable media, and systems for authentication using a text file and a one-time password
Ben-Asher et al. On the need for different security methods on mobile phones
Al Abdulwahid et al. Continuous and transparent multimodal authentication: reviewing the state of the art
US9191811B2 (en) Method and system for managing information on mobile devices
US10432620B2 (en) Biometric authentication
US20140068706A1 (en) Protecting Assets on a Device
Wolf et al. " Pretty Close to a Must-Have" Balancing Usability Desire and Security Concern in Biometric Adoption
Fischer et al. Short paper: Smartphones: Not smart enough?
US20190320039A1 (en) Systems and methods for use in providing digital identities
Alshammari et al. Exploring the adoption of physical security controls in smartphones
CN107395589A (en) Finger print information acquisition methods and terminal
Avdić Use of biometrics in mobile banking security: case study of Croatian banks
Kataria et al. Quantifying smartphone vulnerabilities
Alotaibi et al. A novel transparent user authentication approach for mobile applications
Crossman et al. Two-factor authentication through near field communication
Bailey et al. “Someone Definitely Used 0000”: Strategies, Performance, and User Perception of Novice Smartphone-Unlock PIN-Guessers
Shrestha et al. Curbing mobile malware based on user-transparent hand movements
Meng Graphical authentication
SEDKY et al. Exploring the adoption of physical security controls in smartphones
Boja et al. Impact of the security requirements on mobile applications usability
Bobba et al. Single sign-on using contactless smart cards and fingerprint authentication
Alotaibi et al. MORI: An innovative mobile applications data risk assessment model
Zuccherato et al. Authentication Token