Um die anderen Arten von Veröffentlichungen zu diesem Thema anzuzeigen, folgen Sie diesem Link: Mobile User Authentication.

Dissertationen zum Thema „Mobile User Authentication“

Geben Sie eine Quelle nach APA, MLA, Chicago, Harvard und anderen Zitierweisen an

Wählen Sie eine Art der Quelle aus:

Machen Sie sich mit Top-33 Dissertationen für die Forschung zum Thema "Mobile User Authentication" bekannt.

Neben jedem Werk im Literaturverzeichnis ist die Option "Zur Bibliographie hinzufügen" verfügbar. Nutzen Sie sie, wird Ihre bibliographische Angabe des gewählten Werkes nach der nötigen Zitierweise (APA, MLA, Harvard, Chicago, Vancouver usw.) automatisch gestaltet.

Sie können auch den vollen Text der wissenschaftlichen Publikation im PDF-Format herunterladen und eine Online-Annotation der Arbeit lesen, wenn die relevanten Parameter in den Metadaten verfügbar sind.

Sehen Sie die Dissertationen für verschiedene Spezialgebieten durch und erstellen Sie Ihre Bibliographie auf korrekte Weise.

1

Hallsteinsen, Steffen Gullikstad. "A study of user authentication using mobile phone." Thesis, Norwegian University of Science and Technology, Department of Telematics, 2007. http://urn.kb.se/resolve?urn=urn:nbn:no:ntnu:diva-8817.

Der volle Inhalt der Quelle
Annotation:
<p>The number of different identities and credentials used for authentication towards services on the Internet has increased beyond the manageable. Still, the most common authentication scheme is based on usernames and passwords which are neither secure nor user-friendly. Hence, better solutions for simplified, yet secure authentication, is required in the future. This thesis present an authentication scheme based on a One-Time Password (OTP) MIDlet running on a mobile phone for unified authentication towards any type of service on the Internet. The scheme is described in detail by an analysi
APA, Harvard, Vancouver, ISO und andere Zitierweisen
2

Karatzouni, Sevasti. "Non-intrusive continuous user authentication for mobile devices." Thesis, University of Plymouth, 2014. http://hdl.handle.net/10026.1/3225.

Der volle Inhalt der Quelle
Annotation:
The modern mobile device has become an everyday tool for users and business. Technological advancements in the device itself and the networks that connect them have enabled a range of services and data access which have introduced a subsequent increased security risk. Given the latter, the security requirements need to be re-evaluated and authentication is a key countermeasure in this regard. However, it has traditionally been poorly served and would benefit from research to better understand how authentication can be provided to establish sufficient trust. This thesis investigates the securit
APA, Harvard, Vancouver, ISO und andere Zitierweisen
3

Saevanee, Hataichanok. "Continuous user authentication using multi-modal biometrics." Thesis, University of Plymouth, 2014. http://hdl.handle.net/10026.1/3033.

Der volle Inhalt der Quelle
Annotation:
It is commonly acknowledged that mobile devices now form an integral part of an individual’s everyday life. The modern mobile handheld devices are capable to provide a wide range of services and applications over multiple networks. With the increasing capability and accessibility, they introduce additional demands in term of security. This thesis explores the need for authentication on mobile devices and proposes a novel mechanism to improve the current techniques. The research begins with an intensive review of mobile technologies and the current security challenges that mobile devices experi
APA, Harvard, Vancouver, ISO und andere Zitierweisen
4

Hocking, Christopher George. "Authentication aura : a cooperative and distributed approach to user authentication on mobile devices." Thesis, University of Plymouth, 2015. http://hdl.handle.net/10026.1/3469.

Der volle Inhalt der Quelle
Annotation:
As information technology pervades our lives we have increasingly come to rely on these evermore sophisticated and ubiquitous items of equipment. Portability and the desire to be connected around the clock has driven the rapid growth in adoption of mobile devices that enable us to talk, message, tweet and inform at will, whilst providing a means to shop and administer bank accounts. These high value, high risk, desirable devices are increasingly the target of theft and improvement in their protection is actively sought by Governments and security agencies. Although forms of security are in pla
APA, Harvard, Vancouver, ISO und andere Zitierweisen
5

Molla, Rania A. "Mobile user authentication system (MUAS) for e-commerce applications." Thesis, Edinburgh Napier University, 2017. http://researchrepository.napier.ac.uk/Output/1035289.

Der volle Inhalt der Quelle
Annotation:
The rapid growth of e-commerce has many associated security concerns. Thus, several studies to develop secure online authentication systems have emerged. Most studies begin with the premise that the intermediate network is the primary point of compromise. In this thesis, we assume that the point of compromise lies within the end-host or browser; this security threat is called the man-in-the-browser (MITB) attack. MITB attacks can bypass security measures of public key infrastructures (PKI), as well as encryption mechanisms for secure socket layers and transport layer security (SSL/TLS) protoco
APA, Harvard, Vancouver, ISO und andere Zitierweisen
6

Ben, Tahayekt Ben Tahaikt Chaimaa. "A secure user authentication scheme for critical mobile applications." Thesis, Mälardalens högskola, Akademin för innovation, design och teknik, 2017. http://urn.kb.se/resolve?urn=urn:nbn:se:mdh:diva-34845.

Der volle Inhalt der Quelle
Annotation:
Smartphones have facilitated tasks in private and work life for its users. In business, employees often should manage sensitive data that unauthorised people cannot access, so some user authentication is needed to perform. Besides the normal user authentication, some employers give the right to access to the sensitive data only if the employees stay in specific locations. That makes sense for those businesses that have various construction sites and offices that are not necessarily located in the same geographical region. In those companies, the employees must be able to perform their tasks fr
APA, Harvard, Vancouver, ISO und andere Zitierweisen
7

Du, Tiantian, and Amro Agami. "Examining young users’ security perceptions of mobile banking : A qualitative study on users’ insights about mobile banking." Thesis, Umeå universitet, Företagsekonomi, 2017. http://urn.kb.se/resolve?urn=urn:nbn:se:umu:diva-141655.

Der volle Inhalt der Quelle
Annotation:
The advancement of mobile technology and banking services enabled users to use the mobile banking for a variety of tasks with their smartphones, bringing increased flexibility and value-added services to the customers. However, users still have still concerns regarding the security of mobile banking services. The lack of knowledge of the user about different security threats and mechanisms to improve their security represent a major opportunity for hackers and cyberattacks. Despite the fact that the younger students are more knowledgeable about technologies yet awareness is still a concern. Pe
APA, Harvard, Vancouver, ISO und andere Zitierweisen
8

Zezschwitz, Emanuel von [Verfasser], and Heinrich [Akademischer Betreuer] Hußmann. "Risks and potentials of graphical and gesture-based authentication for touchscreen mobile devices : balancing usability and security through user-centered analysis and design / Emanuel von Zezschwitz ; Betreuer: Heinrich Hußmann." München : Universitätsbibliothek der Ludwig-Maximilians-Universität, 2016. http://d-nb.info/1123957452/34.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
9

Mapoka, Trust Tshepo. "Location based authenticated multi-services group key management for cyber security in high speed broadband wireless multicast communications : multi-service group key management scheme with location based handover authentication for multi-handoffs participating in multi-group service subscriptions, its performance evaluation and security correctness in high speed broadband wireless multicast communications." Thesis, University of Bradford, 2015. http://hdl.handle.net/10454/14468.

Der volle Inhalt der Quelle
Annotation:
Secure information exchanges over cyberspace is on the increase due to the convergence of wireless and mobile access technologies in all businesses. Accordingly, with the proliferation of diverse multicast group service subscriptions that are possible to co-exist within a single broadband network, there is also huge demand by the mobile subscribers to ubiquitously access these services over high speed broadband using their portable devices. Likewise, the Network Providers (NPs) invest hugely in infrastructure deployment to disseminate these services efficiently and concomitantly. Therefore, cy
APA, Harvard, Vancouver, ISO und andere Zitierweisen
10

Porubsky, Jakub. "Biometric Authentication in M-Payments : Analysing and improving end-users’ acceptability." Thesis, Luleå tekniska universitet, Institutionen för system- och rymdteknik, 2020. http://urn.kb.se/resolve?urn=urn:nbn:se:ltu:diva-79221.

Der volle Inhalt der Quelle
Annotation:
Traditional authentication methods like Personal Identification Number (PIN) are getting obsolete and insecure for electronic-payments while mobile-payments are becoming more and more popular. Biometrics such as fingerprint and face recognition authentication methods seem to be a solution to this security issue as they are becoming a regular and integrated part of an average smartphone end-users purchase. However, for mobile-payments to be authenticated by biometrics, end-users acceptability of both technologies must be high. In this research, fingerprint and face recognition authentication me
APA, Harvard, Vancouver, ISO und andere Zitierweisen
11

Zhang, Zhen. "Delivering mobile services to mobile users in open networks: Quality of service, authentication and trust-based access control." Thesis, University of Ottawa (Canada), 2008. http://hdl.handle.net/10393/27745.

Der volle Inhalt der Quelle
Annotation:
This thesis describes scenarios in which a mobile user needs various services, such as Internet telephony, secure printing and online data services in a number of places. From these scenarios we summarize the requirements for quality of service control, service discovery, user authentication and authorization, service access control, and user privacy. In order to implement a prototype to support service discovery, we studied different technologies including Bluetooth, Jini, and Web Services. SDPtool from BlueZ was chosen to limit the search range within the user's local area while using minima
APA, Harvard, Vancouver, ISO und andere Zitierweisen
12

Lee, Cheng-Chi, and 李正吉. "User Authentication Schemes for Mobile Communications." Thesis, 2001. http://ndltd.ncl.edu.tw/handle/08617463212772249246.

Der volle Inhalt der Quelle
Annotation:
碩士<br>朝陽科技大學<br>資訊管理系碩士班<br>89<br>Today, mobile communication is widespread in the world and its technologies have undergone rapid development. It brings convenience to people in their daily life, such that each user can communicate and transfer data with others at any place, at any time. Despite the convenience of mobile communication, an important issue, the security of communication, has drawn the attention of researchers and manufactures. There are two major security requirements, privacy and authentication, in m
APA, Harvard, Vancouver, ISO und andere Zitierweisen
13

Chen, Chiou-Nan, and 陳秋男. "User Authentication in Mobile Satellite Communication System." Thesis, 1999. http://ndltd.ncl.edu.tw/handle/60878481091035184231.

Der volle Inhalt der Quelle
Annotation:
碩士<br>國立中興大學<br>資訊科學研究所<br>87<br>Mobile Satellite Communication System (MSCS) is a world-wide wireless communication network which is constructed from a dozen or hundreds of Low Earth Orbit (LEO) communication satellites. MSCS can provide high speed and high bandwidth communication services beyond the geographic environment limits. Therefore, MSCS will be a shining nova in the 21st century. Up to now, many MSCS building projects have been proposed, but without mature security considerations. In this thesis, we study the security issues in MSCS, and propose a Mobile User Authentication method b
APA, Harvard, Vancouver, ISO und andere Zitierweisen
14

Chen, Yi-Fu, and 陳義夫. "Roaming User Authentication Scheme in Mobile Network." Thesis, 2011. http://ndltd.ncl.edu.tw/handle/49791928465159698545.

Der volle Inhalt der Quelle
Annotation:
碩士<br>淡江大學<br>資訊工程學系資訊網路與通訊碩士班<br>99<br>This research proposes an authentication mechanism for roaming users of mobile networks. Thanks to the rapid development of Internet and wireless communications, users can access to wireless Internet services through mobile devices. Since humans are mobile by nature, they may access Internet with their wireless or mobile devices via a foreign agent. This phenomenon is called roaming. Allowing foreign agents to identify legal users among other cooperating networks is thus an essential issue to keep mobile network security with effective management reachab
APA, Harvard, Vancouver, ISO und andere Zitierweisen
15

Chung, Chin-Hwei, and 鍾慶輝. "Humancrypt- Based User Authentication Protocol for Mobile Communication." Thesis, 2010. http://ndltd.ncl.edu.tw/handle/77947457183330257340.

Der volle Inhalt der Quelle
Annotation:
碩士<br>亞洲大學<br>資訊工程學系碩士班<br>98<br>With the rapid development of the information technology, people’s demand for the mobile services increases dramatically. Here goes along with the opportunity and interest. For this reason, amounts of mobile service providers and scholars start to research on this topic in order to provide a more complete and secure user platform. Because of the progress of technology, users utilize the mobile service to surf on the internet instead of merely voice transmission. However, there might be risk to transmit the radio wave in open environments, so the issues about in
APA, Harvard, Vancouver, ISO und andere Zitierweisen
16

Tseng, Ting-Hsuan, and 曾亭媗. "Location-based Authentication Protocols for Mobile User Environments." Thesis, 2016. http://ndltd.ncl.edu.tw/handle/42712704702185575255.

Der volle Inhalt der Quelle
Annotation:
碩士<br>國立臺灣科技大學<br>資訊管理系<br>104<br>With the increasing popularity of mobile devices, services can be accessed via wireless networks anytime and anywhere. However, the wireless environment has more security threats than wired networks. Therefore, this thesis is concerned with the mobility of mobile devices and security threats in wireless networks, such as unauthorized access, data integrity, etc. We proposed an authentication and authorization mechanism for mobile devices in various environments. The application environments can be divided into household and public location environments with th
APA, Harvard, Vancouver, ISO und andere Zitierweisen
17

Chih-Hao, Hsu, and 許智皓. "Mobile User Authentication Mechanisms on Multi-server Cloud Environment." Thesis, 2013. http://ndltd.ncl.edu.tw/handle/74151980125133266347.

Der volle Inhalt der Quelle
Annotation:
碩士<br>開南大學<br>資訊及電子商務學系<br>101<br>The Mobile User Authentication scheme is a protection technique which protects and manages the access rights of digital contents. It can prevent the confidential information of digital content from unauthorized usages by illegal users. The Mobile User Authentication scheme also supports the content authors to specify their access rights for their digital content, such as reading and editing rights. Thus, after user authentication whether their digital contents can be edited or viewed by an authorized user. The users can easily access these services via the Int
APA, Harvard, Vancouver, ISO und andere Zitierweisen
18

Chang, Ling-Ling, and 張翎翎. "Shoulder-surfing resistant authentication based on mobile user behavior." Thesis, 2016. http://ndltd.ncl.edu.tw/handle/01859613134611451019.

Der volle Inhalt der Quelle
Annotation:
碩士<br>銘傳大學<br>電腦與通訊工程學系碩士班<br>104<br>In recent years, due to the popularity of smartphones, users can use smart devices as a platform for internet services anywhere and anytime. That is to say, a growing number of private messages will be stored on smart devices, so smart devices have been used with many different methods of authentication. But common authentication system is difficult to against shoulder surfing attacks. Many types of research were proposed to resist shoulder surfing attack, but some methods are too complicated. In this study, we proposed a multi-touch gesture authentication
APA, Harvard, Vancouver, ISO und andere Zitierweisen
19

Wu, Shin-Han, and 吳信翰. "A Study on User Authentication Mechanism in Mobile Network." Thesis, 2007. http://ndltd.ncl.edu.tw/handle/18109802492410541415.

Der volle Inhalt der Quelle
Annotation:
碩士<br>世新大學<br>資訊管理學研究所(含碩專班)<br>95<br>Owing to the domestic Third Generation corporations established and popularized by the telecommunication services, the opportunities for consumers to use the telecommunication services with handset devices are increasing. Although consumers enjoy the convenience of telecommunication services, they simultaneously consider the invisible threat in mobile networks. In order to provide consumers with secure and convenient telecommunication services, authentication plays a very important role in the entire mobile network system, acting as the first defense again
APA, Harvard, Vancouver, ISO und andere Zitierweisen
20

Almotairi, Khaled Hatem. "Credit-Based User Authentication for Delay Tolerant Mobile Wireless Networks." Thesis, 2007. http://hdl.handle.net/10012/3498.

Der volle Inhalt der Quelle
Annotation:
Wireless Internet has become increasingly popular due to anywhere anytime access feature. The Internet architecture was designed underlying the existing of the end-to-end path connection. The promise of wireless Internet networks is to provide roaming users connectivity anywhere anytime. However, quality of service (QoS) is still an open issue in wireless networks, which are characterized by possible intermittent connectivity and large transmission delays, due to user mobility, sparse mobile node distribution, link failures (because of hostile propagation medium), and/or other high-priority tr
APA, Harvard, Vancouver, ISO und andere Zitierweisen
21

Chang, Hui Yu, and 張惠喻. "A Biometric-based Remote User Authentication Using Smart Mobile Devices." Thesis, 2013. http://ndltd.ncl.edu.tw/handle/72153052001854432711.

Der volle Inhalt der Quelle
Annotation:
碩士<br>國立中興大學<br>資訊科學與工程學系所<br>101<br>Nowadays, intelligent mobile devices affect people’s live style and the demand of software. Moreover, intelligent mobile devices encourage the software industry to develop rapidly. Remote user authentication of e-commerce and m-commerce has become one of the important security issues. With the improvement of hardware of intelligent mobile device, equipped with advanced camera which takes HD photos, a close-up micrograph is the developing direction of all manufacturers. In 2012, Khaalil and Kurniawan proposed to use the build in camera on intelligent mobile
APA, Harvard, Vancouver, ISO und andere Zitierweisen
22

Cheng, An-Che, and 鄭安哲. "User Authentication via Touch Dynamic in NFC Mobile Payment Environment." Thesis, 2014. http://ndltd.ncl.edu.tw/handle/fz4dkd.

Der volle Inhalt der Quelle
Annotation:
碩士<br>國立雲林科技大學<br>資訊管理系<br>102<br>According to the study, the market scale of the global Near Field Communication mobile payments is very large in recent years, so that the user authentication security issues become very critical. Nowadays, the authentication mechanism of users is mostly based on password. Recently, biometric-based user authentication has become the trend. In the near field communication mobile payment environment, used the authentication which based on behavioral biometric for user authentication to increase security of the near field communication mobile payments. This study
APA, Harvard, Vancouver, ISO und andere Zitierweisen
23

HSIEH, CHUN-TING, and 謝春霆. "An Anonymous Authentication Scheme for Mobile User Roaming in Networks." Thesis, 2017. http://ndltd.ncl.edu.tw/handle/42137357297244482976.

Der volle Inhalt der Quelle
Annotation:
碩士<br>中國文化大學<br>資訊管理學系<br>105<br>With the rapid development of communication technology, people use the network service by the mobile device when traveling at other countries. However, a user needs to verify by the local server in order to use the network service that is provided by the foreign server. Therefore, the secure authentication scheme for roaming with mobile device becomes more important. In 2015, Farash et al. pointed out Shin et al.’s and Wen et al.’s schemes exist several security flaws, then proposed an enhanced scheme to fix the weakness. In 2016, Islam et al. showed Lin et al.
APA, Harvard, Vancouver, ISO und andere Zitierweisen
24

Chen, Wei Yao, and 陳惟堯. "Sequential Multi-Fingerprinting Based Remote User Authentication on Mobile Devices." Thesis, 2014. http://ndltd.ncl.edu.tw/handle/78122041681706419484.

Der volle Inhalt der Quelle
Annotation:
碩士<br>東海大學<br>資訊管理學系<br>102<br>With the rapid development of wireless communication technology and cloud computing services, the development and application of mobile devices will become more popularity. People can use the Internet anytime, anywhere, and perform access, transmission and processing of remote data. In order to ensure the mobile commerce security in the future cloud computing environment, the remote authentication scheme will be more important on mobile devices application.In 2006, Khan et al proposed a fingerprint-based remote user authentication scheme using mobile devices, thi
APA, Harvard, Vancouver, ISO und andere Zitierweisen
25

Chen, Shih-Pin, and 陳世斌. "A Study of User Authentication Protocols in Mobile Communication System." Thesis, 2001. http://ndltd.ncl.edu.tw/handle/81235844231006228108.

Der volle Inhalt der Quelle
Annotation:
碩士<br>國立中興大學<br>資訊科學研究所<br>89<br>Recently, with the development of computer and communication technology, the amount of wireless communication users has rapidly grown. Now we can communicate with other people at anytime, anywhere. In the future, people will more and more rely on this technology. As we enjoy this convenience, we should notice that the transmission media is radio channel. And the radio channel is vulnerable to eavesdropping by unauthorized users. How to prevent illegal users from passive eavesdropping and active tampering is an emergent topic. There are many authentic
APA, Harvard, Vancouver, ISO und andere Zitierweisen
26

Mapoka, Trust T., Simon J. Shepherd, Kelvin O. O. Anoh, Raed A. Abd-Alhameed, Yousef A. S. Dama, and Haider M. AlSabbagh. "Improving authentication function in wireless mobile multicast communications." 2015. http://hdl.handle.net/10454/9193.

Der volle Inhalt der Quelle
Annotation:
No<br>In this paper a distributed authentication scheme based on independent session key per access network (HOISKA) is proposed for the decentralized multi-service group key management scheme in a wireless multicast environment. It enables a handover user Mi involved in multiple multicast service subscriptions to establish the long term credential from the trusted authentication server (As) during initial registration. The Mi then securely reuses the long term credential established to derive unique session keys per access network during handover across diverse access networks. The distribute
APA, Harvard, Vancouver, ISO und andere Zitierweisen
27

Chiou, Tai-Yuan, and 邱泰源. "OTP User Authentication of Value-added Applications for Mobile Network Management." Thesis, 2011. http://ndltd.ncl.edu.tw/handle/43180826283032633628.

Der volle Inhalt der Quelle
Annotation:
碩士<br>清雲科技大學<br>資訊管理所<br>99<br>Recently, smart phone peripheral devices have the widest application with the functions of a camera, Global Positioning System and remote desktop connection. Their research and development has become more diverse development. Because of sophisticated wireless network environment effect on mobile network management, it has brought about many of the actions generated demand for computer network management and mobile security issues. Symantec Corporation’s experts argue that hacker detected user computer information and changed network equipment system settings with
APA, Harvard, Vancouver, ISO und andere Zitierweisen
28

Perez, Luís Paulo Lemos. "Seamless and Strong Authentication on Mobile Devices Based on User Activity." Master's thesis, 2015. http://hdl.handle.net/10400.6/6010.

Der volle Inhalt der Quelle
Annotation:
In 2015, the number of mobile devices (e.g., smartphones, tablets, phablets, etc.) exceeded the number of physical computers worldwide. The physical characteristics of these devices are constantly evolving. Increased autonomy, storage and processing capacity, as well as functionality are factors that lead people to buy more and more of these devices. There are thousands of applications for many different areas, that can be can be installed and used on daily-basis, ranging from finantial applications, to health, games, movies, and utilities, etc. Users increasingly rely on these devices,
APA, Harvard, Vancouver, ISO und andere Zitierweisen
29

Wu, Tien-Han, and 吳典翰. "Protecting Privacy of Mobile Devices Using Continuous Authentication Based on User Behavior." Thesis, 2016. http://ndltd.ncl.edu.tw/handle/76027957630415983455.

Der volle Inhalt der Quelle
Annotation:
碩士<br>國立臺灣大學<br>電機工程學研究所<br>104<br>In recent years, mobile devices are nearly indispensable in our daily lives; for instance, message, Facebook, and credit card number. Therefore, privacy of personal information on mobile devices has become an important issue. Hence, this paper proposes a new approach continuously protecting the user information from an impostor’s attack. The approach detects whether the current users of mobile devices are actual owners or impostors. From the result of our experiment, we observed that our approach obtains the lower equal error rate than that of the related wor
APA, Harvard, Vancouver, ISO und andere Zitierweisen
30

wu, Chia-Ying, and 吳佳盈. "The Study on Some User Authentication and Key Agreement Protocols for Mobile Client-Server Environment." Thesis, 2011. http://ndltd.ncl.edu.tw/handle/73158664853774567979.

Der volle Inhalt der Quelle
Annotation:
碩士<br>亞洲大學<br>光電與通訊學系碩士班<br>99<br>With the rapid development of Internet service the client/server architecture, a lot of people use the Internet to organize a conference or to communicate with each other such as e-mail even though they located in different places in the world. However, the network is a shared medium, so that it’s full of weakness security attacks such as eavesdropping and modification attack. Hence, information security becomes an important issue in the client/server environment. So far, many protocols have been proposed to achieve different purpose. Most of them have to achi
APA, Harvard, Vancouver, ISO und andere Zitierweisen
31

Tseng, Yun-ru, and 曾筠茹. "A Study on User Authentications of Mobile Communications." Thesis, 2014. http://ndltd.ncl.edu.tw/handle/8yy945.

Der volle Inhalt der Quelle
Annotation:
碩士<br>大同大學<br>資訊經營學系(所)<br>102<br>Due to the rapid development on Internet and various 3C Products, user has convenient access to the Internet and can browse information easily by Laptop, Smartphone or Tablet. Situated in the network environment, users are changing their consuming habits. For example, more and more people are shopping online or getting services through mobile device instead of going to the store personally. They also use mobile device or near-field sensing to make payment directly or indirectly. In such an environment, information security problem emerges and user identity aut
APA, Harvard, Vancouver, ISO und andere Zitierweisen
32

Lee, Cheng-Chi, and 李正吉. "MOBILE USERS PRIVACY AND AUTHENTICATION IN WIRELESS COMMUNICATION SYSTEMS." Thesis, 2007. http://ndltd.ncl.edu.tw/handle/61845963901402108451.

Der volle Inhalt der Quelle
Annotation:
博士<br>中興大學<br>資訊科學系所<br>95<br>Since wireless communication is gaining popularity in recent years, people can roam freely and use the mobile service almost everywhere. Many mobile service systems, such as the Personal Communication Systems (PCS), the Global System of Mobile communications (GSM), and the Universal Mobile Communication System (UMTS), have been developed and have become very popular around the world. It brings so much convenience for people''s life that anyone can use it to communicate with anyone else in almost any place at any time. However, people are most worried about two maj
APA, Harvard, Vancouver, ISO und andere Zitierweisen
33

Yu, Wen-Lin, and 游文霖. "A Framework of Authenticating Mobile Phone Users using Touch Screen and Accelerometers Data." Thesis, 2014. http://ndltd.ncl.edu.tw/handle/y6947j.

Der volle Inhalt der Quelle
Annotation:
碩士<br>國立清華大學<br>資訊工程學系<br>102<br>Smartphones have become very popular in recent years. Nowadays, almost everyone has a smartphone. Smartphones are getting more powerful and have more functions than before. You can transfer money, save photos, or buy an application for a smart phone. For these reasons, smartphones have more and more privacy issues than before. Google already proposed a few locking features in an android device, like graphical pattern lock or PIN code lock. Although these kinds of unlock phone features keep the devices safe when the owner is not near the mobile phone, users have
APA, Harvard, Vancouver, ISO und andere Zitierweisen
Wir bieten Rabatte auf alle Premium-Pläne für Autoren, deren Werke in thematische Literatursammlungen aufgenommen wurden. Kontaktieren Sie uns, um einen einzigartigen Promo-Code zu erhalten!