Zeitschriftenartikel zum Thema „Mobile User Authentication“
Geben Sie eine Quelle nach APA, MLA, Chicago, Harvard und anderen Zitierweisen an
Machen Sie sich mit Top-50 Zeitschriftenartikel für die Forschung zum Thema "Mobile User Authentication" bekannt.
Neben jedem Werk im Literaturverzeichnis ist die Option "Zur Bibliographie hinzufügen" verfügbar. Nutzen Sie sie, wird Ihre bibliographische Angabe des gewählten Werkes nach der nötigen Zitierweise (APA, MLA, Harvard, Chicago, Vancouver usw.) automatisch gestaltet.
Sie können auch den vollen Text der wissenschaftlichen Publikation im PDF-Format herunterladen und eine Online-Annotation der Arbeit lesen, wenn die relevanten Parameter in den Metadaten verfügbar sind.
Sehen Sie die Zeitschriftenartikel für verschiedene Spezialgebieten durch und erstellen Sie Ihre Bibliographie auf korrekte Weise.
Yuan, Yi Fei, Lian Zhong Liu, and Chun Yan Han. "A Security Compliance Based Mobile User Authentication Scheme." Advanced Materials Research 989-994 (July 2014): 4514–18. http://dx.doi.org/10.4028/www.scientific.net/amr.989-994.4514.
Der volle Inhalt der QuelleUgochukwu, Ejike Ekeke Kingsley, Yusmadi Yah Jusoh, Sharifah Md Yasin, Azizol Abdullah, and Salfarina Abdullah. "Graphical User Authentication Algorithm for Mobile Banking User." Advanced Science Letters 24, no. 7 (2018): 5182–86. http://dx.doi.org/10.1166/asl.2018.11698.
Der volle Inhalt der QuelleClarke, N. L., and S. M. Furnell. "Advanced user authentication for mobile devices." Computers & Security 26, no. 2 (2007): 109–19. http://dx.doi.org/10.1016/j.cose.2006.08.008.
Der volle Inhalt der QuelleDee, Timothy, Ryan Scheel, Nicholas Montelibano, and Akhilesh Tyagi. "User-Silicon Entangled Mobile Identity Authentication." Journal of Hardware and Systems Security 4, no. 3 (2020): 208–29. http://dx.doi.org/10.1007/s41635-020-00098-7.
Der volle Inhalt der QuelleLi, Wei Jing, Ping Zhu, Hua Zhang, and Zheng Ping Jin. "An Efficient Mobile User Authentication Scheme with User Anonymity for Wireless Communications." Applied Mechanics and Materials 631-632 (September 2014): 906–9. http://dx.doi.org/10.4028/www.scientific.net/amm.631-632.906.
Der volle Inhalt der QuelleSbeyti, Hassan, Beatrice El Hage, and Ahmad Fadlallah. "Mobile user signature extraction based on user behavioural pattern (MUSEP)." International Journal of Pervasive Computing and Communications 12, no. 4 (2016): 421–46. http://dx.doi.org/10.1108/ijpcc-05-2016-0025.
Der volle Inhalt der QuelleSeto, Jamie, Ye Wang, and Xiaodong Lin. "User-Habit-Oriented Authentication Model: Toward Secure, User-Friendly Authentication for Mobile Devices." IEEE Transactions on Emerging Topics in Computing 3, no. 1 (2015): 107–18. http://dx.doi.org/10.1109/tetc.2014.2379991.
Der volle Inhalt der QuelleSenthil Kumar, T., and S. Prabakaran. "Security and Privacy enforced wireless mobile communication using PI-MAKA protocol design." Measurement and Control 52, no. 7-8 (2019): 788–93. http://dx.doi.org/10.1177/0020294019842893.
Der volle Inhalt der QuelleShin, Soobok, Kangseok Kim, Ki-Hyung Kim, and Hongjin Yeh. "A Remote User Authentication Scheme with Anonymity for Mobile Devices." International Journal of Advanced Robotic Systems 9, no. 1 (2012): 13. http://dx.doi.org/10.5772/50912.
Der volle Inhalt der QuelleAhn, Jungsub, Sung Woon Lee, and Hyunsung Kim. "NFC Based Privacy Preserving User Authentication Scheme in Mobile Office." International Journal of Computer and Communication Engineering 5, no. 1 (2016): 61–70. http://dx.doi.org/10.17706/ijcce.2016.5.1.61-70.
Der volle Inhalt der QuelleSunghyuck Hong. "User Behavior Based Authentication on Mobile Network." International Journal of Advancements in Computing Technology 5, no. 11 (2013): 233–37. http://dx.doi.org/10.4156/ijact.vol5.issue11.25.
Der volle Inhalt der QuelleYeh, Her-Tyan, Bing-Chang Chen, and Yi-Cong Wu. "Mobile user authentication system in cloud environment." Security and Communication Networks 6, no. 9 (2012): 1161–68. http://dx.doi.org/10.1002/sec.688.
Der volle Inhalt der QuelleGupta, Brij B., and Shaifali Narayan. "A Key-Based Mutual Authentication Framework for Mobile Contactless Payment System Using Authentication Server." Journal of Organizational and End User Computing 33, no. 2 (2021): 1–16. http://dx.doi.org/10.4018/joeuc.20210301.oa1.
Der volle Inhalt der QuelleTeh, Pin Shen, Ning Zhang, Syh-Yuan Tan, Qi Shi, Wee How Khoh, and Raheel Nawaz. "Strengthen user authentication on mobile devices by using user’s touch dynamics pattern." Journal of Ambient Intelligence and Humanized Computing 11, no. 10 (2019): 4019–39. http://dx.doi.org/10.1007/s12652-019-01654-y.
Der volle Inhalt der QuelleSmith, Katherine A., Leming Zhou, and Valerie J. M. Watzlaf. "User Authentication in Smartphones for Telehealth." International Journal of Telerehabilitation 9, no. 2 (2017): 3–12. http://dx.doi.org/10.5195/ijt.2017.6226.
Der volle Inhalt der QuelleWang, Feng, Ge Bao Shan, Yong Chen, et al. "Identity Authentication Security Management in Mobile Payment Systems." Journal of Global Information Management 28, no. 1 (2020): 189–203. http://dx.doi.org/10.4018/jgim.2020010110.
Der volle Inhalt der QuelleHorniichuk, Ivan, Viktor Yevetskyi, and Volodymyr Kubrak. "Applying mobile devices in biometric user authentication systems." Collection "Information technology and security" 7, no. 1 (2019): 14–24. http://dx.doi.org/10.20535/2411-1031.2019.7.1.184213.
Der volle Inhalt der QuelleZhao, Xi, Tao Feng, Weidong Shi, and Ioannis A. Kakadiaris. "Mobile User Authentication Using Statistical Touch Dynamics Images." IEEE Transactions on Information Forensics and Security 9, no. 11 (2014): 1780–89. http://dx.doi.org/10.1109/tifs.2014.2350916.
Der volle Inhalt der QuelleJeong, Hoon, and Euiin Choi. "User Authentication using Profiling in Mobile Cloud Computing." AASRI Procedia 2 (2012): 262–67. http://dx.doi.org/10.1016/j.aasri.2012.09.044.
Der volle Inhalt der QuelleZhang, Xiaomei, Pengming Zhang, and Haomin Hu. "Multimodal Continuous User Authentication on Mobile Devices via Interaction Patterns." Wireless Communications and Mobile Computing 2021 (August 17, 2021): 1–15. http://dx.doi.org/10.1155/2021/5677978.
Der volle Inhalt der QuelleSvilar, Aleksandra, and Jože Zupančič. "User Experience with Security Elements in Internet and Mobile Banking." Organizacija 49, no. 4 (2016): 251–60. http://dx.doi.org/10.1515/orga-2016-0022.
Der volle Inhalt der QuelleLiang, Xiaoshi, Futai Zou, Linsen Li, and Ping Yi. "Mobile terminal identity authentication system based on behavioral characteristics." International Journal of Distributed Sensor Networks 16, no. 1 (2020): 155014771989937. http://dx.doi.org/10.1177/1550147719899371.
Der volle Inhalt der QuelleMarukhlenko, A. L., A. V. Plugatarev, M. O. Tanygin, L. O. Marukhlenko, and M. Yu Shashkov. "Option of Control of Access to Information Resources Based on Implicit Authentication." Proceedings of the Southwest State University 24, no. 2 (2020): 108–21. http://dx.doi.org/10.21869/2223-1560-2020-24-2-108-121.
Der volle Inhalt der QuelleMoon, Jongho, Youngsook Lee, Jiye Kim, and Dongho Won. "Improving an Anonymous and Provably Secure Authentication Protocol for a Mobile User." Security and Communication Networks 2017 (2017): 1–13. http://dx.doi.org/10.1155/2017/1378128.
Der volle Inhalt der QuelleLEE, RAYMOND S. T. "iJADE AUTHENTICATOR — AN INTELLIGENT MULTIAGENT BASED FACIAL AUTHENTICATION SYSTEM." International Journal of Pattern Recognition and Artificial Intelligence 16, no. 04 (2002): 481–500. http://dx.doi.org/10.1142/s0218001402001794.
Der volle Inhalt der QuelleSyabila Zabidi, Nur, Noris Mohd Norowi, and Rahmita Wirza O.K. Rahmat. "A Survey of User Preferences on Biometric Authentication for Smartphones." International Journal of Engineering & Technology 7, no. 4.15 (2018): 491. http://dx.doi.org/10.14419/ijet.v7i4.15.25763.
Der volle Inhalt der QuelleSu Jeong, Yoon, Yong Tae Kim, and Gil Cheol Park. "Attribute-based multiuser authentication scheme between IoT devices for 5G environment." International Journal of Engineering & Technology 7, no. 2.12 (2018): 11. http://dx.doi.org/10.14419/ijet.v7i2.12.11026.
Der volle Inhalt der QuelleKról, Piotr, Damian Marek, and Jakub Smołka. "Analysis of user behavior and authorization methods in context of mobile devices security." Journal of Computer Sciences Institute 6 (March 30, 2018): 34–41. http://dx.doi.org/10.35784/jcsi.636.
Der volle Inhalt der QuelleFurnell, Steven, Nathan Clarke, and Sevasti Karatzouni. "Beyond the PIN: Enhancing user authentication for mobile devices." Computer Fraud & Security 2008, no. 8 (2008): 12–17. http://dx.doi.org/10.1016/s1361-3723(08)70127-1.
Der volle Inhalt der QuellePu, Qiong, Jian Wang, and Shuhua Wu. "Scalable and efficient mobile authentication scheme preserving user privacy." International Journal of Ad Hoc and Ubiquitous Computing 12, no. 2 (2013): 65. http://dx.doi.org/10.1504/ijahuc.2013.052345.
Der volle Inhalt der QuelleAlotaibi, Saud Nejr, Steven Furnell, and Nathan Clarke. "A novel transparent user authentication approach for mobile applications." Information Security Journal: A Global Perspective 27, no. 5-6 (2018): 292–305. http://dx.doi.org/10.1080/19393555.2019.1609628.
Der volle Inhalt der QuellePerera, Pramuditha, and Vishal M. Patel. "Face-Based Multiple User Active Authentication on Mobile Devices." IEEE Transactions on Information Forensics and Security 14, no. 5 (2019): 1240–50. http://dx.doi.org/10.1109/tifs.2018.2876748.
Der volle Inhalt der QuelleKim, Soo-Cheol, Sang-Soo Yeo, and Sung Kwon Kim. "A hybrid user authentication protocol for mobile IPTV service." Multimedia Tools and Applications 65, no. 2 (2011): 283–96. http://dx.doi.org/10.1007/s11042-011-0810-5.
Der volle Inhalt der QuelleLi, Wenting, Yaosheng Shen, and Ping Wang. "Breaking Three Remote user Authentication Systems for Mobile Devices." Journal of Signal Processing Systems 90, no. 8-9 (2017): 1179–90. http://dx.doi.org/10.1007/s11265-017-1305-z.
Der volle Inhalt der QuelleWang, Chen, Yan Wang, Yingying Chen, Hongbo Liu, and Jian Liu. "User authentication on mobile devices: Approaches, threats and trends." Computer Networks 170 (April 2020): 107118. http://dx.doi.org/10.1016/j.comnet.2020.107118.
Der volle Inhalt der QuelleShahandashti, Siamak F., Reihaneh Safavi-Naini, and Nashad Ahmed Safa. "Reconciling user privacy and implicit authentication for mobile devices." Computers & Security 53 (September 2015): 215–33. http://dx.doi.org/10.1016/j.cose.2015.05.009.
Der volle Inhalt der QuelleMurao, Kazuya, Hayami Tobise, Tsutomu Terada, Toshiki Iso, Masahiko Tsukamoto, and Tsutomu Horikoshi. "Mobile phone user authentication with grip gestures using pressure sensors." International Journal of Pervasive Computing and Communications 11, no. 3 (2015): 288–301. http://dx.doi.org/10.1108/ijpcc-03-2015-0017.
Der volle Inhalt der QuelleHan, Ziyi, Li Yang, Shen Wang, Sen Mu, and Qiang Liu. "Efficient Multifactor Two-Server Authenticated Scheme under Mobile Cloud Computing." Wireless Communications and Mobile Computing 2018 (September 12, 2018): 1–14. http://dx.doi.org/10.1155/2018/9149730.
Der volle Inhalt der QuelleAlsaffar, Aymen Abdullah, Young-Rok Shin, and Eui-Nam Huh. "IPTV Service Framework Based on Secure Authentication and Lightweight Content Encryption for Screen-Migration in Cloud Computing." Advances in Multimedia 2015 (2015): 1–13. http://dx.doi.org/10.1155/2015/147320.
Der volle Inhalt der QuelleLavanya, D. L., R. Ramaprabha, and K. Gunaseelan. "Privacy Preserving Physical Layer Authentication Scheme for LBS based Wireless Networks." Defence Science Journal 71, no. 2 (2021): 241–47. http://dx.doi.org/10.14429/dsj.71.15355.
Der volle Inhalt der QuelleSpooren, Jan, Davy Preuveneers, and Wouter Joosen. "Leveraging Battery Usage from Mobile Devices for Active Authentication." Mobile Information Systems 2017 (2017): 1–14. http://dx.doi.org/10.1155/2017/1367064.
Der volle Inhalt der QuelleYang, Chao, Junwei Zhang, Jingjing Guo, Yu Zheng, Li Yang, and Jianfeng Ma. "Fingerprint Protected Password Authentication Protocol." Security and Communication Networks 2019 (June 26, 2019): 1–12. http://dx.doi.org/10.1155/2019/1694702.
Der volle Inhalt der QuelleIrshad, Azeem, Shehzad Ashraf Chaudhry, Muhammad Shafiq, Muhammad Usman, Muhammad Asif, and Anwar Ghani. "A provable and secure mobile user authentication scheme for mobile cloud computing services." International Journal of Communication Systems 32, no. 14 (2019): e3980. http://dx.doi.org/10.1002/dac.3980.
Der volle Inhalt der QuelleMary Bastina, A. Amali, and N. Rama. "Biometric Identification and Authentication Providence using Fingerprint for Cloud Data Access." International Journal of Electrical and Computer Engineering (IJECE) 7, no. 1 (2017): 408. http://dx.doi.org/10.11591/ijece.v7i1.pp408-416.
Der volle Inhalt der QuelleMeng, Weizhi, Duncan S. Wong, and Lam-For Kwok. "The effect of adaptive mechanism on behavioural biometric based mobile phone authentication." Information Management & Computer Security 22, no. 2 (2014): 155–66. http://dx.doi.org/10.1108/imcs-09-2013-0062.
Der volle Inhalt der QuelleKang, Seo-Il, Choon-Sik Park, and Im-Yeong Lee. "A Study on User Authentication for Roaming in Mobile Device." KIPS Transactions:PartC 15C, no. 5 (2008): 343–50. http://dx.doi.org/10.3745/kipstc.2008.15-c.5.343.
Der volle Inhalt der QuelleKarakaya, Nurhak, Gülfem Işıklar Alptekin, and Özlem Durmaz İncel. "Using behavioral biometric sensors of mobile phones for user authentication." Procedia Computer Science 159 (2019): 475–84. http://dx.doi.org/10.1016/j.procs.2019.09.202.
Der volle Inhalt der QuelleCrawford, Heather, and Karen Renaud. "Understanding user perceptions of transparent authentication on a mobile device." Journal of Trust Management 1, no. 1 (2014): 7. http://dx.doi.org/10.1186/2196-064x-1-7.
Der volle Inhalt der QuelleIslam, SK Hafizul, Mohammad S. Obaidat, and Ruhul Amin. "An anonymous and provably secure authentication scheme for mobile user." International Journal of Communication Systems 29, no. 9 (2016): 1529–44. http://dx.doi.org/10.1002/dac.3126.
Der volle Inhalt der QuelleGope, Prosanta, SK Hafizul Islam, Mohammad S. Obaidat, Ruhul Amin, and Pandi Vijayakumar. "Anonymous and expeditious mobile user authentication scheme for GLOMONET environments." International Journal of Communication Systems 31, no. 2 (2017): e3461. http://dx.doi.org/10.1002/dac.3461.
Der volle Inhalt der Quelle