Inhaltsverzeichnis
Auswahl der wissenschaftlichen Literatur zum Thema „Mobile User Authentication“
Geben Sie eine Quelle nach APA, MLA, Chicago, Harvard und anderen Zitierweisen an
Machen Sie sich mit den Listen der aktuellen Artikel, Bücher, Dissertationen, Berichten und anderer wissenschaftlichen Quellen zum Thema "Mobile User Authentication" bekannt.
Neben jedem Werk im Literaturverzeichnis ist die Option "Zur Bibliographie hinzufügen" verfügbar. Nutzen Sie sie, wird Ihre bibliographische Angabe des gewählten Werkes nach der nötigen Zitierweise (APA, MLA, Harvard, Chicago, Vancouver usw.) automatisch gestaltet.
Sie können auch den vollen Text der wissenschaftlichen Publikation im PDF-Format herunterladen und eine Online-Annotation der Arbeit lesen, wenn die relevanten Parameter in den Metadaten verfügbar sind.
Zeitschriftenartikel zum Thema "Mobile User Authentication"
Yuan, Yi Fei, Lian Zhong Liu, and Chun Yan Han. "A Security Compliance Based Mobile User Authentication Scheme." Advanced Materials Research 989-994 (July 2014): 4514–18. http://dx.doi.org/10.4028/www.scientific.net/amr.989-994.4514.
Der volle Inhalt der QuelleUgochukwu, Ejike Ekeke Kingsley, Yusmadi Yah Jusoh, Sharifah Md Yasin, Azizol Abdullah, and Salfarina Abdullah. "Graphical User Authentication Algorithm for Mobile Banking User." Advanced Science Letters 24, no. 7 (2018): 5182–86. http://dx.doi.org/10.1166/asl.2018.11698.
Der volle Inhalt der QuelleClarke, N. L., and S. M. Furnell. "Advanced user authentication for mobile devices." Computers & Security 26, no. 2 (2007): 109–19. http://dx.doi.org/10.1016/j.cose.2006.08.008.
Der volle Inhalt der QuelleDee, Timothy, Ryan Scheel, Nicholas Montelibano, and Akhilesh Tyagi. "User-Silicon Entangled Mobile Identity Authentication." Journal of Hardware and Systems Security 4, no. 3 (2020): 208–29. http://dx.doi.org/10.1007/s41635-020-00098-7.
Der volle Inhalt der QuelleLi, Wei Jing, Ping Zhu, Hua Zhang, and Zheng Ping Jin. "An Efficient Mobile User Authentication Scheme with User Anonymity for Wireless Communications." Applied Mechanics and Materials 631-632 (September 2014): 906–9. http://dx.doi.org/10.4028/www.scientific.net/amm.631-632.906.
Der volle Inhalt der QuelleSbeyti, Hassan, Beatrice El Hage, and Ahmad Fadlallah. "Mobile user signature extraction based on user behavioural pattern (MUSEP)." International Journal of Pervasive Computing and Communications 12, no. 4 (2016): 421–46. http://dx.doi.org/10.1108/ijpcc-05-2016-0025.
Der volle Inhalt der QuelleSeto, Jamie, Ye Wang, and Xiaodong Lin. "User-Habit-Oriented Authentication Model: Toward Secure, User-Friendly Authentication for Mobile Devices." IEEE Transactions on Emerging Topics in Computing 3, no. 1 (2015): 107–18. http://dx.doi.org/10.1109/tetc.2014.2379991.
Der volle Inhalt der QuelleSenthil Kumar, T., and S. Prabakaran. "Security and Privacy enforced wireless mobile communication using PI-MAKA protocol design." Measurement and Control 52, no. 7-8 (2019): 788–93. http://dx.doi.org/10.1177/0020294019842893.
Der volle Inhalt der QuelleShin, Soobok, Kangseok Kim, Ki-Hyung Kim, and Hongjin Yeh. "A Remote User Authentication Scheme with Anonymity for Mobile Devices." International Journal of Advanced Robotic Systems 9, no. 1 (2012): 13. http://dx.doi.org/10.5772/50912.
Der volle Inhalt der QuelleAhn, Jungsub, Sung Woon Lee, and Hyunsung Kim. "NFC Based Privacy Preserving User Authentication Scheme in Mobile Office." International Journal of Computer and Communication Engineering 5, no. 1 (2016): 61–70. http://dx.doi.org/10.17706/ijcce.2016.5.1.61-70.
Der volle Inhalt der QuelleDissertationen zum Thema "Mobile User Authentication"
Hallsteinsen, Steffen Gullikstad. "A study of user authentication using mobile phone." Thesis, Norwegian University of Science and Technology, Department of Telematics, 2007. http://urn.kb.se/resolve?urn=urn:nbn:no:ntnu:diva-8817.
Der volle Inhalt der QuelleKaratzouni, Sevasti. "Non-intrusive continuous user authentication for mobile devices." Thesis, University of Plymouth, 2014. http://hdl.handle.net/10026.1/3225.
Der volle Inhalt der QuelleSaevanee, Hataichanok. "Continuous user authentication using multi-modal biometrics." Thesis, University of Plymouth, 2014. http://hdl.handle.net/10026.1/3033.
Der volle Inhalt der QuelleHocking, Christopher George. "Authentication aura : a cooperative and distributed approach to user authentication on mobile devices." Thesis, University of Plymouth, 2015. http://hdl.handle.net/10026.1/3469.
Der volle Inhalt der QuelleMolla, Rania A. "Mobile user authentication system (MUAS) for e-commerce applications." Thesis, Edinburgh Napier University, 2017. http://researchrepository.napier.ac.uk/Output/1035289.
Der volle Inhalt der QuelleBen, Tahayekt Ben Tahaikt Chaimaa. "A secure user authentication scheme for critical mobile applications." Thesis, Mälardalens högskola, Akademin för innovation, design och teknik, 2017. http://urn.kb.se/resolve?urn=urn:nbn:se:mdh:diva-34845.
Der volle Inhalt der QuelleDu, Tiantian, and Amro Agami. "Examining young users’ security perceptions of mobile banking : A qualitative study on users’ insights about mobile banking." Thesis, Umeå universitet, Företagsekonomi, 2017. http://urn.kb.se/resolve?urn=urn:nbn:se:umu:diva-141655.
Der volle Inhalt der QuelleZezschwitz, Emanuel von [Verfasser], and Heinrich [Akademischer Betreuer] Hußmann. "Risks and potentials of graphical and gesture-based authentication for touchscreen mobile devices : balancing usability and security through user-centered analysis and design / Emanuel von Zezschwitz ; Betreuer: Heinrich Hußmann." München : Universitätsbibliothek der Ludwig-Maximilians-Universität, 2016. http://d-nb.info/1123957452/34.
Der volle Inhalt der QuelleMapoka, Trust Tshepo. "Location based authenticated multi-services group key management for cyber security in high speed broadband wireless multicast communications : multi-service group key management scheme with location based handover authentication for multi-handoffs participating in multi-group service subscriptions, its performance evaluation and security correctness in high speed broadband wireless multicast communications." Thesis, University of Bradford, 2015. http://hdl.handle.net/10454/14468.
Der volle Inhalt der QuellePorubsky, Jakub. "Biometric Authentication in M-Payments : Analysing and improving end-users’ acceptability." Thesis, Luleå tekniska universitet, Institutionen för system- och rymdteknik, 2020. http://urn.kb.se/resolve?urn=urn:nbn:se:ltu:diva-79221.
Der volle Inhalt der QuelleBuchteile zum Thema "Mobile User Authentication"
Rogowski, Marcin, Khalid Saeed, Mariusz Rybnik, Marek Tabedzki, and Marcin Adamski. "User Authentication for Mobile Devices." In Computer Information Systems and Industrial Management. Springer Berlin Heidelberg, 2013. http://dx.doi.org/10.1007/978-3-642-40925-7_5.
Der volle Inhalt der QuelleAli, Adnan Bin Amanat, Vasaki Ponnusamy, and Anbuselvan Sangodiah. "User Behaviour-Based Mobile Authentication System." In Advances in Intelligent Systems and Computing. Springer Singapore, 2019. http://dx.doi.org/10.1007/978-981-13-6861-5_40.
Der volle Inhalt der QuelleSui, Yan, Xukai Zou, Feng Li, and Eliza Y. Du. "Active User Authentication for Mobile Devices." In Wireless Algorithms, Systems, and Applications. Springer Berlin Heidelberg, 2012. http://dx.doi.org/10.1007/978-3-642-31869-6_47.
Der volle Inhalt der QuelleLach, Jacek. "Using Mobile Devices for User Authentication." In Computer Networks. Springer Berlin Heidelberg, 2010. http://dx.doi.org/10.1007/978-3-642-13861-4_27.
Der volle Inhalt der Quelle(Mark) Nguyen, Hoang, Ajita Rattani, and Reza Derakhshani. "Mobile User Re-authentication Using Clothing Information." In Selfie Biometrics. Springer International Publishing, 2019. http://dx.doi.org/10.1007/978-3-030-26972-2_13.
Der volle Inhalt der QuelleYazji, Sausan, Xi Chen, Robert P. Dick, and Peter Scheuermann. "Implicit User Re-authentication for Mobile Devices." In Ubiquitous Intelligence and Computing. Springer Berlin Heidelberg, 2009. http://dx.doi.org/10.1007/978-3-642-02830-4_25.
Der volle Inhalt der QuelleClarke, Nathan, Sevasti Karatzouni, and Steven Furnell. "Flexible and Transparent User Authentication for Mobile Devices." In Emerging Challenges for Security, Privacy and Trust. Springer Berlin Heidelberg, 2009. http://dx.doi.org/10.1007/978-3-642-01244-0_1.
Der volle Inhalt der QuelleKim, Siwan, Hyunyi Yi, and Jeong Hyun Yi. "FakePIN: Dummy Key Based Mobile User Authentication Scheme." In Lecture Notes in Electrical Engineering. Springer Berlin Heidelberg, 2014. http://dx.doi.org/10.1007/978-3-642-41671-2_21.
Der volle Inhalt der QuelleAli, Adnan Bin Amanat, Vasaki Ponnusamy, and Anbuselvan Sangodiah. "Correction to: User Behaviour-Based Mobile Authentication System." In Advances in Intelligent Systems and Computing. Springer Singapore, 2019. http://dx.doi.org/10.1007/978-981-13-6861-5_64.
Der volle Inhalt der QuelleMoon, Sung-Won, Young-Gab Kim, Chang-Joo Moon, and Doo-Kwon Baik. "Password-Based User Authentication Protocol for Mobile Environment." In Information Networking. Advances in Data Communications and Wireless Networks. Springer Berlin Heidelberg, 2006. http://dx.doi.org/10.1007/11919568_74.
Der volle Inhalt der QuelleKonferenzberichte zum Thema "Mobile User Authentication"
Khare, Karan, and Teng-Sheng Moh. "Mobile gesture-based iPhone user authentication." In 2015 IEEE International Conference on Big Data (Big Data). IEEE, 2015. http://dx.doi.org/10.1109/bigdata.2015.7363929.
Der volle Inhalt der QuelleChiang, Hsin-Yi, and Sonia Chiasson. "Improving user authentication on mobile devices." In the 15th international conference. ACM Press, 2013. http://dx.doi.org/10.1145/2493190.2493213.
Der volle Inhalt der QuelleFrolova, Daria, Anna Epishkina, and Konstantin Kogos. "Mobile User Authentication Using Keystroke Dynamics." In 2019 European Intelligence and Security Informatics Conference (EISIC). IEEE, 2019. http://dx.doi.org/10.1109/eisic49498.2019.9108890.
Der volle Inhalt der QuelleBajwa, Garima, Ram Dantu, and Ryan Aldridge. "Pass-pic: A mobile user authentication." In 2015 IEEE International Conference on Intelligence and Security Informatics (ISI). IEEE, 2015. http://dx.doi.org/10.1109/isi.2015.7165977.
Der volle Inhalt der QuelleSoonhwa Sung, Cheong Youn, Eunbae Kong, and Jaecheol Ryou. "User authentication using mobile phones for mobile payment." In 2015 International Conference on Information Networking (ICOIN). IEEE, 2015. http://dx.doi.org/10.1109/icoin.2015.7057856.
Der volle Inhalt der QuelleFindling, Rainhard Dieter, and René Mayrhofer. "Towards device-to-user authentication." In MUM '15: 14th International Conference on Mobile and Ubiquitous Multimedia. ACM, 2015. http://dx.doi.org/10.1145/2836041.2836053.
Der volle Inhalt der QuelleLi, Chang, Jiwu Jing, and Yuheng Liu. "Mobile user authentication-Turn it to unlock." In ICMAI 2021: 2021 6th International Conference on Mathematics and Artificial Intelligence. ACM, 2021. http://dx.doi.org/10.1145/3460569.3460577.
Der volle Inhalt der QuelleWang, Kanlun, Lina Zhou, and Dongsong Zhang. "User Preferences and Situational Needs of Mobile User Authentication Methods." In 2019 IEEE International Conference on Intelligence and Security Informatics (ISI). IEEE, 2019. http://dx.doi.org/10.1109/isi.2019.8823274.
Der volle Inhalt der QuelleAbu Sulayman, Iman I. M., and Abdelkader Ouda. "User Modeling via Anomaly Detection Techniques for User Authentication." In 2019 IEEE 10th Annual Information Technology, Electronics and Mobile Communication Conference (IEMCON). IEEE, 2019. http://dx.doi.org/10.1109/iemcon.2019.8936183.
Der volle Inhalt der QuelleWang, Xiaoming, and Guoxiang Yao. "User Authentication Scheme for Sensor Networks." In 2010 6th International Conference on Wireless Communications, Networking and Mobile Computing (WiCOM). IEEE, 2010. http://dx.doi.org/10.1109/wicom.2010.5601157.
Der volle Inhalt der Quelle