Alshammari et al., 2015 - Google Patents
Exploring the adoption of physical security controls in smartphonesAlshammari et al., 2015
View PDF- Document ID
- 8641722000214094811
- Author
- Alshammari N
- Mylonas A
- Sedky M
- Champion J
- Bauer C
- Publication year
- Publication venue
- International Conference on Human Aspects of Information Security, Privacy, and Trust
External Links
Snippet
The proliferation of smartphones has changed our life due to the enhanced connectivity, increased storage capacity and innovative functionality they offer. Their increased popularity has drawn the attention of attackers, thus, nowadays their users are exposed to many …
- 230000035755 proliferation 0 abstract description 3
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US11238139B2 (en) | Methods for securely storing sensitive data on mobile device | |
Chanajitt et al. | Forensic analysis and security assessment of Android m-banking apps | |
US11140155B2 (en) | Methods, computer readable media, and systems for authentication using a text file and a one-time password | |
Ben-Asher et al. | On the need for different security methods on mobile phones | |
Al Abdulwahid et al. | Continuous and transparent multimodal authentication: reviewing the state of the art | |
US9191811B2 (en) | Method and system for managing information on mobile devices | |
US10432620B2 (en) | Biometric authentication | |
US20140068706A1 (en) | Protecting Assets on a Device | |
Wolf et al. | " Pretty Close to a Must-Have" Balancing Usability Desire and Security Concern in Biometric Adoption | |
Fischer et al. | Short paper: Smartphones: Not smart enough? | |
US20190320039A1 (en) | Systems and methods for use in providing digital identities | |
Alshammari et al. | Exploring the adoption of physical security controls in smartphones | |
CN107395589A (en) | Finger print information acquisition methods and terminal | |
Avdić | Use of biometrics in mobile banking security: case study of Croatian banks | |
Kataria et al. | Quantifying smartphone vulnerabilities | |
Alotaibi et al. | A novel transparent user authentication approach for mobile applications | |
Crossman et al. | Two-factor authentication through near field communication | |
Bailey et al. | “Someone Definitely Used 0000”: Strategies, Performance, and User Perception of Novice Smartphone-Unlock PIN-Guessers | |
Shrestha et al. | Curbing mobile malware based on user-transparent hand movements | |
Meng | Graphical authentication | |
SEDKY et al. | Exploring the adoption of physical security controls in smartphones | |
Boja et al. | Impact of the security requirements on mobile applications usability | |
Bobba et al. | Single sign-on using contactless smart cards and fingerprint authentication | |
Alotaibi et al. | MORI: An innovative mobile applications data risk assessment model | |
Zuccherato et al. | Authentication Token |