[go: up one dir, main page]

Gupta et al., 2018 - Google Patents

Demystifying authentication concepts in smartphones: Ways and types to secure access

Gupta et al., 2018

View PDF @Full View
Document ID
2655908617356821305
Author
Gupta S
Buriro A
Crispo B
Publication year
Publication venue
Mobile Information Systems

External Links

Snippet

Smartphones are the most popular and widespread personal devices. Apart from their conventional use, that is, calling and texting, they have also been used to perform multiple security sensitive activities, such as online banking and shopping, social networking, taking …
Continue reading at onlinelibrary.wiley.com (PDF) (other versions)

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
    • G06F21/6245Protecting personal data, e.g. for financial or medical purposes
    • G06F21/6263Protecting personal data, e.g. for financial or medical purposes during internet communication, e.g. revealing personal data from cookies

Similar Documents

Publication Publication Date Title
Gupta et al. Demystifying authentication concepts in smartphones: Ways and types to secure access
JP7603121B2 (en) Secure Key Storage Extensions for Transaction Verification and Cryptocurrencies
US10868672B1 (en) Establishing and verifying identity using biometrics while protecting user privacy
Al Abdulwahid et al. Continuous and transparent multimodal authentication: reviewing the state of the art
Papathanasaki et al. Modern authentication methods: A comprehensive survey
Meng et al. Surveying the development of biometric user authentication on mobile phones
KR20180016232A (en) Authentication techniques including speech and/or lip movement analysis
Guerar et al. Invisible CAPPCHA: A usable mechanism to distinguish between malware and humans on the mobile IoT
Moallem Human-Computer Interaction and cybersecurity handbook
Yıldırım et al. Android based mobile application development for web login authentication using fingerprint recognition feature
Yusop et al. Advancing passwordless authentication: A systematic review of methods, challenges, and future directions for secure user identity
Campbell Putting the Passe into passwords: how passwordless technologies are reshaping digital identity
Gupta Next-generation user authentication schemes for iot applications
Boonkrong Multi-factor authentication
Papaioannou et al. User authentication and authorization for next generation mobile passenger ID devices for land and sea border control
Al Abdulwahid et al. The current use of authentication technologies: an investigative review
Peisert et al. Principles of authentication
Abiodun et al. Securing digital transaction using a three-level authentication system
Papaioannou et al. Behavioral biometrics for mobile user authentication: benefits and limitations
Shakir User authentication in public cloud computing through adoption of electronic personal synthesis behavior
Papaioannou et al. Risk Estimation for a Secure & Usable User Authentication Mechanism for Mobile Passenger ID Devices
Prasad A comparative study of passwordless authentication
Dasgupta et al. Authentication Basics: Key to the kingdom–Access a Computing System
Wilusz et al. Security analysis of transaction authorization methods for next generation electronic payment services
van Oorschot User authentication—passwords, biometrics and alternatives