Gupta et al., 2018 - Google Patents
Demystifying authentication concepts in smartphones: Ways and types to secure accessGupta et al., 2018
View PDF- Document ID
- 2655908617356821305
- Author
- Gupta S
- Buriro A
- Crispo B
- Publication year
- Publication venue
- Mobile Information Systems
External Links
Snippet
Smartphones are the most popular and widespread personal devices. Apart from their conventional use, that is, calling and texting, they have also been used to perform multiple security sensitive activities, such as online banking and shopping, social networking, taking …
- 230000003068 static 0 abstract description 13
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6218—Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
- G06F21/6245—Protecting personal data, e.g. for financial or medical purposes
- G06F21/6263—Protecting personal data, e.g. for financial or medical purposes during internet communication, e.g. revealing personal data from cookies
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Gupta et al. | Demystifying authentication concepts in smartphones: Ways and types to secure access | |
JP7603121B2 (en) | Secure Key Storage Extensions for Transaction Verification and Cryptocurrencies | |
US10868672B1 (en) | Establishing and verifying identity using biometrics while protecting user privacy | |
Al Abdulwahid et al. | Continuous and transparent multimodal authentication: reviewing the state of the art | |
Papathanasaki et al. | Modern authentication methods: A comprehensive survey | |
Meng et al. | Surveying the development of biometric user authentication on mobile phones | |
KR20180016232A (en) | Authentication techniques including speech and/or lip movement analysis | |
Guerar et al. | Invisible CAPPCHA: A usable mechanism to distinguish between malware and humans on the mobile IoT | |
Moallem | Human-Computer Interaction and cybersecurity handbook | |
Yıldırım et al. | Android based mobile application development for web login authentication using fingerprint recognition feature | |
Yusop et al. | Advancing passwordless authentication: A systematic review of methods, challenges, and future directions for secure user identity | |
Campbell | Putting the Passe into passwords: how passwordless technologies are reshaping digital identity | |
Gupta | Next-generation user authentication schemes for iot applications | |
Boonkrong | Multi-factor authentication | |
Papaioannou et al. | User authentication and authorization for next generation mobile passenger ID devices for land and sea border control | |
Al Abdulwahid et al. | The current use of authentication technologies: an investigative review | |
Peisert et al. | Principles of authentication | |
Abiodun et al. | Securing digital transaction using a three-level authentication system | |
Papaioannou et al. | Behavioral biometrics for mobile user authentication: benefits and limitations | |
Shakir | User authentication in public cloud computing through adoption of electronic personal synthesis behavior | |
Papaioannou et al. | Risk Estimation for a Secure & Usable User Authentication Mechanism for Mobile Passenger ID Devices | |
Prasad | A comparative study of passwordless authentication | |
Dasgupta et al. | Authentication Basics: Key to the kingdom–Access a Computing System | |
Wilusz et al. | Security analysis of transaction authorization methods for next generation electronic payment services | |
van Oorschot | User authentication—passwords, biometrics and alternatives |