Auswahl der wissenschaftlichen Literatur zum Thema „Mobile User Authentication“

Geben Sie eine Quelle nach APA, MLA, Chicago, Harvard und anderen Zitierweisen an

Wählen Sie eine Art der Quelle aus:

Machen Sie sich mit den Listen der aktuellen Artikel, Bücher, Dissertationen, Berichten und anderer wissenschaftlichen Quellen zum Thema "Mobile User Authentication" bekannt.

Neben jedem Werk im Literaturverzeichnis ist die Option "Zur Bibliographie hinzufügen" verfügbar. Nutzen Sie sie, wird Ihre bibliographische Angabe des gewählten Werkes nach der nötigen Zitierweise (APA, MLA, Harvard, Chicago, Vancouver usw.) automatisch gestaltet.

Sie können auch den vollen Text der wissenschaftlichen Publikation im PDF-Format herunterladen und eine Online-Annotation der Arbeit lesen, wenn die relevanten Parameter in den Metadaten verfügbar sind.

Zeitschriftenartikel zum Thema "Mobile User Authentication"

1

Yuan, Yi Fei, Lian Zhong Liu, and Chun Yan Han. "A Security Compliance Based Mobile User Authentication Scheme." Advanced Materials Research 989-994 (July 2014): 4514–18. http://dx.doi.org/10.4028/www.scientific.net/amr.989-994.4514.

Der volle Inhalt der Quelle
Annotation:
The BYOD (Bring Your Own Device) scenario puts traditional two-factor authentication into great security challenge. To strengthen the authentication in BYOD scenario, we propose a security compliance based mobile user authentication scheme, which includes a novel calculation method for device identifier, and a fine-grained compliance strategy and its management. The scheme provides a secure authentication mechanism for BYOD scenario and satisfies the requirements of device authentication in mobile user authentication.
APA, Harvard, Vancouver, ISO und andere Zitierweisen
2

Ugochukwu, Ejike Ekeke Kingsley, Yusmadi Yah Jusoh, Sharifah Md Yasin, Azizol Abdullah, and Salfarina Abdullah. "Graphical User Authentication Algorithm for Mobile Banking User." Advanced Science Letters 24, no. 7 (2018): 5182–86. http://dx.doi.org/10.1166/asl.2018.11698.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
3

Clarke, N. L., and S. M. Furnell. "Advanced user authentication for mobile devices." Computers & Security 26, no. 2 (2007): 109–19. http://dx.doi.org/10.1016/j.cose.2006.08.008.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
4

Dee, Timothy, Ryan Scheel, Nicholas Montelibano, and Akhilesh Tyagi. "User-Silicon Entangled Mobile Identity Authentication." Journal of Hardware and Systems Security 4, no. 3 (2020): 208–29. http://dx.doi.org/10.1007/s41635-020-00098-7.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
5

Li, Wei Jing, Ping Zhu, Hua Zhang, and Zheng Ping Jin. "An Efficient Mobile User Authentication Scheme with User Anonymity for Wireless Communications." Applied Mechanics and Materials 631-632 (September 2014): 906–9. http://dx.doi.org/10.4028/www.scientific.net/amm.631-632.906.

Der volle Inhalt der Quelle
Annotation:
Recently, many mobile user authentication schemes with user anonymity for wireless communications have been proposed. In 2012, Li and Lee proposed a novel user authentication and privacy preserving scheme with smart cards for wireless communications. In 2013, Jeon et al. proposed an improved user authentication scheme, and claimed their scheme achieves user anonymity and more efficient. On the basis of their work, we put forward a new user authentication scheme using elliptic curve cryptography with user anonymity for wireless communications. The security and performance analysis show that the
APA, Harvard, Vancouver, ISO und andere Zitierweisen
6

Sbeyti, Hassan, Beatrice El Hage, and Ahmad Fadlallah. "Mobile user signature extraction based on user behavioural pattern (MUSEP)." International Journal of Pervasive Computing and Communications 12, no. 4 (2016): 421–46. http://dx.doi.org/10.1108/ijpcc-05-2016-0025.

Der volle Inhalt der Quelle
Annotation:
Purpose The purpose of this paper is to extract the user behaviour and transform it into a unique signature that can be used as implicit authentication technique. Smart devices are equipped with multiple authentication techniques and still remain prone to attacks because all of these techniques require explicit intervention of the user. Entering a pin code, a password or even having a biometric print can be easily hacked by an adversary. Design/methodology/approach In this paper, the authors introduce a novel authentication model to be used as complementary to the existing authentication model
APA, Harvard, Vancouver, ISO und andere Zitierweisen
7

Seto, Jamie, Ye Wang, and Xiaodong Lin. "User-Habit-Oriented Authentication Model: Toward Secure, User-Friendly Authentication for Mobile Devices." IEEE Transactions on Emerging Topics in Computing 3, no. 1 (2015): 107–18. http://dx.doi.org/10.1109/tetc.2014.2379991.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
8

Senthil Kumar, T., and S. Prabakaran. "Security and Privacy enforced wireless mobile communication using PI-MAKA protocol design." Measurement and Control 52, no. 7-8 (2019): 788–93. http://dx.doi.org/10.1177/0020294019842893.

Der volle Inhalt der Quelle
Annotation:
The fast development of mobile networks and compact mobile devices bring attention to the users for wireless mobile communication. But providing security and protecting the privacy of users are the main challenges of wireless mobile communication. Recently, Authenticated Key Agreement protocols are used for secure and reliable communication in wireless mobile communication. However, the User-to-User Mutual Authentication and Key Agreement scheme is based on bilinear pairings, which involves relatively high computation cost when compared to elliptic curve scalar point multiplication. Hence, in
APA, Harvard, Vancouver, ISO und andere Zitierweisen
9

Shin, Soobok, Kangseok Kim, Ki-Hyung Kim, and Hongjin Yeh. "A Remote User Authentication Scheme with Anonymity for Mobile Devices." International Journal of Advanced Robotic Systems 9, no. 1 (2012): 13. http://dx.doi.org/10.5772/50912.

Der volle Inhalt der Quelle
Annotation:
With the rapid growth of information technologies, mobile devices have been utilized in a variety of services such as e-commerce. When a remote server provides such e-commerce services to a user, it must verify the legitimacy of the user over an insecure communication channel. Therefore, remote user authentication has been widely deployed to verify the legitimacy of remote user login requests using mobile devices like smart cards. In this paper we propose a smart card-based authentication scheme that provides both user anonymity and mutual authentication between a remote server and a user. The
APA, Harvard, Vancouver, ISO und andere Zitierweisen
10

Ahn, Jungsub, Sung Woon Lee, and Hyunsung Kim. "NFC Based Privacy Preserving User Authentication Scheme in Mobile Office." International Journal of Computer and Communication Engineering 5, no. 1 (2016): 61–70. http://dx.doi.org/10.17706/ijcce.2016.5.1.61-70.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
Mehr Quellen

Dissertationen zum Thema "Mobile User Authentication"

1

Hallsteinsen, Steffen Gullikstad. "A study of user authentication using mobile phone." Thesis, Norwegian University of Science and Technology, Department of Telematics, 2007. http://urn.kb.se/resolve?urn=urn:nbn:no:ntnu:diva-8817.

Der volle Inhalt der Quelle
Annotation:
<p>The number of different identities and credentials used for authentication towards services on the Internet has increased beyond the manageable. Still, the most common authentication scheme is based on usernames and passwords which are neither secure nor user-friendly. Hence, better solutions for simplified, yet secure authentication, is required in the future. This thesis present an authentication scheme based on a One-Time Password (OTP) MIDlet running on a mobile phone for unified authentication towards any type of service on the Internet. The scheme is described in detail by an analysi
APA, Harvard, Vancouver, ISO und andere Zitierweisen
2

Karatzouni, Sevasti. "Non-intrusive continuous user authentication for mobile devices." Thesis, University of Plymouth, 2014. http://hdl.handle.net/10026.1/3225.

Der volle Inhalt der Quelle
Annotation:
The modern mobile device has become an everyday tool for users and business. Technological advancements in the device itself and the networks that connect them have enabled a range of services and data access which have introduced a subsequent increased security risk. Given the latter, the security requirements need to be re-evaluated and authentication is a key countermeasure in this regard. However, it has traditionally been poorly served and would benefit from research to better understand how authentication can be provided to establish sufficient trust. This thesis investigates the securit
APA, Harvard, Vancouver, ISO und andere Zitierweisen
3

Saevanee, Hataichanok. "Continuous user authentication using multi-modal biometrics." Thesis, University of Plymouth, 2014. http://hdl.handle.net/10026.1/3033.

Der volle Inhalt der Quelle
Annotation:
It is commonly acknowledged that mobile devices now form an integral part of an individual’s everyday life. The modern mobile handheld devices are capable to provide a wide range of services and applications over multiple networks. With the increasing capability and accessibility, they introduce additional demands in term of security. This thesis explores the need for authentication on mobile devices and proposes a novel mechanism to improve the current techniques. The research begins with an intensive review of mobile technologies and the current security challenges that mobile devices experi
APA, Harvard, Vancouver, ISO und andere Zitierweisen
4

Hocking, Christopher George. "Authentication aura : a cooperative and distributed approach to user authentication on mobile devices." Thesis, University of Plymouth, 2015. http://hdl.handle.net/10026.1/3469.

Der volle Inhalt der Quelle
Annotation:
As information technology pervades our lives we have increasingly come to rely on these evermore sophisticated and ubiquitous items of equipment. Portability and the desire to be connected around the clock has driven the rapid growth in adoption of mobile devices that enable us to talk, message, tweet and inform at will, whilst providing a means to shop and administer bank accounts. These high value, high risk, desirable devices are increasingly the target of theft and improvement in their protection is actively sought by Governments and security agencies. Although forms of security are in pla
APA, Harvard, Vancouver, ISO und andere Zitierweisen
5

Molla, Rania A. "Mobile user authentication system (MUAS) for e-commerce applications." Thesis, Edinburgh Napier University, 2017. http://researchrepository.napier.ac.uk/Output/1035289.

Der volle Inhalt der Quelle
Annotation:
The rapid growth of e-commerce has many associated security concerns. Thus, several studies to develop secure online authentication systems have emerged. Most studies begin with the premise that the intermediate network is the primary point of compromise. In this thesis, we assume that the point of compromise lies within the end-host or browser; this security threat is called the man-in-the-browser (MITB) attack. MITB attacks can bypass security measures of public key infrastructures (PKI), as well as encryption mechanisms for secure socket layers and transport layer security (SSL/TLS) protoco
APA, Harvard, Vancouver, ISO und andere Zitierweisen
6

Ben, Tahayekt Ben Tahaikt Chaimaa. "A secure user authentication scheme for critical mobile applications." Thesis, Mälardalens högskola, Akademin för innovation, design och teknik, 2017. http://urn.kb.se/resolve?urn=urn:nbn:se:mdh:diva-34845.

Der volle Inhalt der Quelle
Annotation:
Smartphones have facilitated tasks in private and work life for its users. In business, employees often should manage sensitive data that unauthorised people cannot access, so some user authentication is needed to perform. Besides the normal user authentication, some employers give the right to access to the sensitive data only if the employees stay in specific locations. That makes sense for those businesses that have various construction sites and offices that are not necessarily located in the same geographical region. In those companies, the employees must be able to perform their tasks fr
APA, Harvard, Vancouver, ISO und andere Zitierweisen
7

Du, Tiantian, and Amro Agami. "Examining young users’ security perceptions of mobile banking : A qualitative study on users’ insights about mobile banking." Thesis, Umeå universitet, Företagsekonomi, 2017. http://urn.kb.se/resolve?urn=urn:nbn:se:umu:diva-141655.

Der volle Inhalt der Quelle
Annotation:
The advancement of mobile technology and banking services enabled users to use the mobile banking for a variety of tasks with their smartphones, bringing increased flexibility and value-added services to the customers. However, users still have still concerns regarding the security of mobile banking services. The lack of knowledge of the user about different security threats and mechanisms to improve their security represent a major opportunity for hackers and cyberattacks. Despite the fact that the younger students are more knowledgeable about technologies yet awareness is still a concern. Pe
APA, Harvard, Vancouver, ISO und andere Zitierweisen
8

Zezschwitz, Emanuel von [Verfasser], and Heinrich [Akademischer Betreuer] Hußmann. "Risks and potentials of graphical and gesture-based authentication for touchscreen mobile devices : balancing usability and security through user-centered analysis and design / Emanuel von Zezschwitz ; Betreuer: Heinrich Hußmann." München : Universitätsbibliothek der Ludwig-Maximilians-Universität, 2016. http://d-nb.info/1123957452/34.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
9

Mapoka, Trust Tshepo. "Location based authenticated multi-services group key management for cyber security in high speed broadband wireless multicast communications : multi-service group key management scheme with location based handover authentication for multi-handoffs participating in multi-group service subscriptions, its performance evaluation and security correctness in high speed broadband wireless multicast communications." Thesis, University of Bradford, 2015. http://hdl.handle.net/10454/14468.

Der volle Inhalt der Quelle
Annotation:
Secure information exchanges over cyberspace is on the increase due to the convergence of wireless and mobile access technologies in all businesses. Accordingly, with the proliferation of diverse multicast group service subscriptions that are possible to co-exist within a single broadband network, there is also huge demand by the mobile subscribers to ubiquitously access these services over high speed broadband using their portable devices. Likewise, the Network Providers (NPs) invest hugely in infrastructure deployment to disseminate these services efficiently and concomitantly. Therefore, cy
APA, Harvard, Vancouver, ISO und andere Zitierweisen
10

Porubsky, Jakub. "Biometric Authentication in M-Payments : Analysing and improving end-users’ acceptability." Thesis, Luleå tekniska universitet, Institutionen för system- och rymdteknik, 2020. http://urn.kb.se/resolve?urn=urn:nbn:se:ltu:diva-79221.

Der volle Inhalt der Quelle
Annotation:
Traditional authentication methods like Personal Identification Number (PIN) are getting obsolete and insecure for electronic-payments while mobile-payments are becoming more and more popular. Biometrics such as fingerprint and face recognition authentication methods seem to be a solution to this security issue as they are becoming a regular and integrated part of an average smartphone end-users purchase. However, for mobile-payments to be authenticated by biometrics, end-users acceptability of both technologies must be high. In this research, fingerprint and face recognition authentication me
APA, Harvard, Vancouver, ISO und andere Zitierweisen
Mehr Quellen

Buchteile zum Thema "Mobile User Authentication"

1

Rogowski, Marcin, Khalid Saeed, Mariusz Rybnik, Marek Tabedzki, and Marcin Adamski. "User Authentication for Mobile Devices." In Computer Information Systems and Industrial Management. Springer Berlin Heidelberg, 2013. http://dx.doi.org/10.1007/978-3-642-40925-7_5.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
2

Ali, Adnan Bin Amanat, Vasaki Ponnusamy, and Anbuselvan Sangodiah. "User Behaviour-Based Mobile Authentication System." In Advances in Intelligent Systems and Computing. Springer Singapore, 2019. http://dx.doi.org/10.1007/978-981-13-6861-5_40.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
3

Sui, Yan, Xukai Zou, Feng Li, and Eliza Y. Du. "Active User Authentication for Mobile Devices." In Wireless Algorithms, Systems, and Applications. Springer Berlin Heidelberg, 2012. http://dx.doi.org/10.1007/978-3-642-31869-6_47.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
4

Lach, Jacek. "Using Mobile Devices for User Authentication." In Computer Networks. Springer Berlin Heidelberg, 2010. http://dx.doi.org/10.1007/978-3-642-13861-4_27.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
5

(Mark) Nguyen, Hoang, Ajita Rattani, and Reza Derakhshani. "Mobile User Re-authentication Using Clothing Information." In Selfie Biometrics. Springer International Publishing, 2019. http://dx.doi.org/10.1007/978-3-030-26972-2_13.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
6

Yazji, Sausan, Xi Chen, Robert P. Dick, and Peter Scheuermann. "Implicit User Re-authentication for Mobile Devices." In Ubiquitous Intelligence and Computing. Springer Berlin Heidelberg, 2009. http://dx.doi.org/10.1007/978-3-642-02830-4_25.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
7

Clarke, Nathan, Sevasti Karatzouni, and Steven Furnell. "Flexible and Transparent User Authentication for Mobile Devices." In Emerging Challenges for Security, Privacy and Trust. Springer Berlin Heidelberg, 2009. http://dx.doi.org/10.1007/978-3-642-01244-0_1.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
8

Kim, Siwan, Hyunyi Yi, and Jeong Hyun Yi. "FakePIN: Dummy Key Based Mobile User Authentication Scheme." In Lecture Notes in Electrical Engineering. Springer Berlin Heidelberg, 2014. http://dx.doi.org/10.1007/978-3-642-41671-2_21.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
9

Ali, Adnan Bin Amanat, Vasaki Ponnusamy, and Anbuselvan Sangodiah. "Correction to: User Behaviour-Based Mobile Authentication System." In Advances in Intelligent Systems and Computing. Springer Singapore, 2019. http://dx.doi.org/10.1007/978-981-13-6861-5_64.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
10

Moon, Sung-Won, Young-Gab Kim, Chang-Joo Moon, and Doo-Kwon Baik. "Password-Based User Authentication Protocol for Mobile Environment." In Information Networking. Advances in Data Communications and Wireless Networks. Springer Berlin Heidelberg, 2006. http://dx.doi.org/10.1007/11919568_74.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen

Konferenzberichte zum Thema "Mobile User Authentication"

1

Khare, Karan, and Teng-Sheng Moh. "Mobile gesture-based iPhone user authentication." In 2015 IEEE International Conference on Big Data (Big Data). IEEE, 2015. http://dx.doi.org/10.1109/bigdata.2015.7363929.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
2

Chiang, Hsin-Yi, and Sonia Chiasson. "Improving user authentication on mobile devices." In the 15th international conference. ACM Press, 2013. http://dx.doi.org/10.1145/2493190.2493213.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
3

Frolova, Daria, Anna Epishkina, and Konstantin Kogos. "Mobile User Authentication Using Keystroke Dynamics." In 2019 European Intelligence and Security Informatics Conference (EISIC). IEEE, 2019. http://dx.doi.org/10.1109/eisic49498.2019.9108890.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
4

Bajwa, Garima, Ram Dantu, and Ryan Aldridge. "Pass-pic: A mobile user authentication." In 2015 IEEE International Conference on Intelligence and Security Informatics (ISI). IEEE, 2015. http://dx.doi.org/10.1109/isi.2015.7165977.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
5

Soonhwa Sung, Cheong Youn, Eunbae Kong, and Jaecheol Ryou. "User authentication using mobile phones for mobile payment." In 2015 International Conference on Information Networking (ICOIN). IEEE, 2015. http://dx.doi.org/10.1109/icoin.2015.7057856.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
6

Findling, Rainhard Dieter, and René Mayrhofer. "Towards device-to-user authentication." In MUM '15: 14th International Conference on Mobile and Ubiquitous Multimedia. ACM, 2015. http://dx.doi.org/10.1145/2836041.2836053.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
7

Li, Chang, Jiwu Jing, and Yuheng Liu. "Mobile user authentication-Turn it to unlock." In ICMAI 2021: 2021 6th International Conference on Mathematics and Artificial Intelligence. ACM, 2021. http://dx.doi.org/10.1145/3460569.3460577.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
8

Wang, Kanlun, Lina Zhou, and Dongsong Zhang. "User Preferences and Situational Needs of Mobile User Authentication Methods." In 2019 IEEE International Conference on Intelligence and Security Informatics (ISI). IEEE, 2019. http://dx.doi.org/10.1109/isi.2019.8823274.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
9

Abu Sulayman, Iman I. M., and Abdelkader Ouda. "User Modeling via Anomaly Detection Techniques for User Authentication." In 2019 IEEE 10th Annual Information Technology, Electronics and Mobile Communication Conference (IEMCON). IEEE, 2019. http://dx.doi.org/10.1109/iemcon.2019.8936183.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
10

Wang, Xiaoming, and Guoxiang Yao. "User Authentication Scheme for Sensor Networks." In 2010 6th International Conference on Wireless Communications, Networking and Mobile Computing (WiCOM). IEEE, 2010. http://dx.doi.org/10.1109/wicom.2010.5601157.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
Wir bieten Rabatte auf alle Premium-Pläne für Autoren, deren Werke in thematische Literatursammlungen aufgenommen wurden. Kontaktieren Sie uns, um einen einzigartigen Promo-Code zu erhalten!