Academic literature on the topic 'Mobile User Authentication'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Mobile User Authentication.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Journal articles on the topic "Mobile User Authentication"
Yuan, Yi Fei, Lian Zhong Liu, and Chun Yan Han. "A Security Compliance Based Mobile User Authentication Scheme." Advanced Materials Research 989-994 (July 2014): 4514–18. http://dx.doi.org/10.4028/www.scientific.net/amr.989-994.4514.
Full textUgochukwu, Ejike Ekeke Kingsley, Yusmadi Yah Jusoh, Sharifah Md Yasin, Azizol Abdullah, and Salfarina Abdullah. "Graphical User Authentication Algorithm for Mobile Banking User." Advanced Science Letters 24, no. 7 (2018): 5182–86. http://dx.doi.org/10.1166/asl.2018.11698.
Full textClarke, N. L., and S. M. Furnell. "Advanced user authentication for mobile devices." Computers & Security 26, no. 2 (2007): 109–19. http://dx.doi.org/10.1016/j.cose.2006.08.008.
Full textDee, Timothy, Ryan Scheel, Nicholas Montelibano, and Akhilesh Tyagi. "User-Silicon Entangled Mobile Identity Authentication." Journal of Hardware and Systems Security 4, no. 3 (2020): 208–29. http://dx.doi.org/10.1007/s41635-020-00098-7.
Full textLi, Wei Jing, Ping Zhu, Hua Zhang, and Zheng Ping Jin. "An Efficient Mobile User Authentication Scheme with User Anonymity for Wireless Communications." Applied Mechanics and Materials 631-632 (September 2014): 906–9. http://dx.doi.org/10.4028/www.scientific.net/amm.631-632.906.
Full textSbeyti, Hassan, Beatrice El Hage, and Ahmad Fadlallah. "Mobile user signature extraction based on user behavioural pattern (MUSEP)." International Journal of Pervasive Computing and Communications 12, no. 4 (2016): 421–46. http://dx.doi.org/10.1108/ijpcc-05-2016-0025.
Full textSeto, Jamie, Ye Wang, and Xiaodong Lin. "User-Habit-Oriented Authentication Model: Toward Secure, User-Friendly Authentication for Mobile Devices." IEEE Transactions on Emerging Topics in Computing 3, no. 1 (2015): 107–18. http://dx.doi.org/10.1109/tetc.2014.2379991.
Full textSenthil Kumar, T., and S. Prabakaran. "Security and Privacy enforced wireless mobile communication using PI-MAKA protocol design." Measurement and Control 52, no. 7-8 (2019): 788–93. http://dx.doi.org/10.1177/0020294019842893.
Full textShin, Soobok, Kangseok Kim, Ki-Hyung Kim, and Hongjin Yeh. "A Remote User Authentication Scheme with Anonymity for Mobile Devices." International Journal of Advanced Robotic Systems 9, no. 1 (2012): 13. http://dx.doi.org/10.5772/50912.
Full textAhn, Jungsub, Sung Woon Lee, and Hyunsung Kim. "NFC Based Privacy Preserving User Authentication Scheme in Mobile Office." International Journal of Computer and Communication Engineering 5, no. 1 (2016): 61–70. http://dx.doi.org/10.17706/ijcce.2016.5.1.61-70.
Full textDissertations / Theses on the topic "Mobile User Authentication"
Hallsteinsen, Steffen Gullikstad. "A study of user authentication using mobile phone." Thesis, Norwegian University of Science and Technology, Department of Telematics, 2007. http://urn.kb.se/resolve?urn=urn:nbn:no:ntnu:diva-8817.
Full textKaratzouni, Sevasti. "Non-intrusive continuous user authentication for mobile devices." Thesis, University of Plymouth, 2014. http://hdl.handle.net/10026.1/3225.
Full textSaevanee, Hataichanok. "Continuous user authentication using multi-modal biometrics." Thesis, University of Plymouth, 2014. http://hdl.handle.net/10026.1/3033.
Full textHocking, Christopher George. "Authentication aura : a cooperative and distributed approach to user authentication on mobile devices." Thesis, University of Plymouth, 2015. http://hdl.handle.net/10026.1/3469.
Full textMolla, Rania A. "Mobile user authentication system (MUAS) for e-commerce applications." Thesis, Edinburgh Napier University, 2017. http://researchrepository.napier.ac.uk/Output/1035289.
Full textBen, Tahayekt Ben Tahaikt Chaimaa. "A secure user authentication scheme for critical mobile applications." Thesis, Mälardalens högskola, Akademin för innovation, design och teknik, 2017. http://urn.kb.se/resolve?urn=urn:nbn:se:mdh:diva-34845.
Full textDu, Tiantian, and Amro Agami. "Examining young users’ security perceptions of mobile banking : A qualitative study on users’ insights about mobile banking." Thesis, Umeå universitet, Företagsekonomi, 2017. http://urn.kb.se/resolve?urn=urn:nbn:se:umu:diva-141655.
Full textZezschwitz, Emanuel von [Verfasser], and Heinrich [Akademischer Betreuer] Hußmann. "Risks and potentials of graphical and gesture-based authentication for touchscreen mobile devices : balancing usability and security through user-centered analysis and design / Emanuel von Zezschwitz ; Betreuer: Heinrich Hußmann." München : Universitätsbibliothek der Ludwig-Maximilians-Universität, 2016. http://d-nb.info/1123957452/34.
Full textMapoka, Trust Tshepo. "Location based authenticated multi-services group key management for cyber security in high speed broadband wireless multicast communications : multi-service group key management scheme with location based handover authentication for multi-handoffs participating in multi-group service subscriptions, its performance evaluation and security correctness in high speed broadband wireless multicast communications." Thesis, University of Bradford, 2015. http://hdl.handle.net/10454/14468.
Full textPorubsky, Jakub. "Biometric Authentication in M-Payments : Analysing and improving end-users’ acceptability." Thesis, Luleå tekniska universitet, Institutionen för system- och rymdteknik, 2020. http://urn.kb.se/resolve?urn=urn:nbn:se:ltu:diva-79221.
Full textBook chapters on the topic "Mobile User Authentication"
Rogowski, Marcin, Khalid Saeed, Mariusz Rybnik, Marek Tabedzki, and Marcin Adamski. "User Authentication for Mobile Devices." In Computer Information Systems and Industrial Management. Springer Berlin Heidelberg, 2013. http://dx.doi.org/10.1007/978-3-642-40925-7_5.
Full textAli, Adnan Bin Amanat, Vasaki Ponnusamy, and Anbuselvan Sangodiah. "User Behaviour-Based Mobile Authentication System." In Advances in Intelligent Systems and Computing. Springer Singapore, 2019. http://dx.doi.org/10.1007/978-981-13-6861-5_40.
Full textSui, Yan, Xukai Zou, Feng Li, and Eliza Y. Du. "Active User Authentication for Mobile Devices." In Wireless Algorithms, Systems, and Applications. Springer Berlin Heidelberg, 2012. http://dx.doi.org/10.1007/978-3-642-31869-6_47.
Full textLach, Jacek. "Using Mobile Devices for User Authentication." In Computer Networks. Springer Berlin Heidelberg, 2010. http://dx.doi.org/10.1007/978-3-642-13861-4_27.
Full text(Mark) Nguyen, Hoang, Ajita Rattani, and Reza Derakhshani. "Mobile User Re-authentication Using Clothing Information." In Selfie Biometrics. Springer International Publishing, 2019. http://dx.doi.org/10.1007/978-3-030-26972-2_13.
Full textYazji, Sausan, Xi Chen, Robert P. Dick, and Peter Scheuermann. "Implicit User Re-authentication for Mobile Devices." In Ubiquitous Intelligence and Computing. Springer Berlin Heidelberg, 2009. http://dx.doi.org/10.1007/978-3-642-02830-4_25.
Full textClarke, Nathan, Sevasti Karatzouni, and Steven Furnell. "Flexible and Transparent User Authentication for Mobile Devices." In Emerging Challenges for Security, Privacy and Trust. Springer Berlin Heidelberg, 2009. http://dx.doi.org/10.1007/978-3-642-01244-0_1.
Full textKim, Siwan, Hyunyi Yi, and Jeong Hyun Yi. "FakePIN: Dummy Key Based Mobile User Authentication Scheme." In Lecture Notes in Electrical Engineering. Springer Berlin Heidelberg, 2014. http://dx.doi.org/10.1007/978-3-642-41671-2_21.
Full textAli, Adnan Bin Amanat, Vasaki Ponnusamy, and Anbuselvan Sangodiah. "Correction to: User Behaviour-Based Mobile Authentication System." In Advances in Intelligent Systems and Computing. Springer Singapore, 2019. http://dx.doi.org/10.1007/978-981-13-6861-5_64.
Full textMoon, Sung-Won, Young-Gab Kim, Chang-Joo Moon, and Doo-Kwon Baik. "Password-Based User Authentication Protocol for Mobile Environment." In Information Networking. Advances in Data Communications and Wireless Networks. Springer Berlin Heidelberg, 2006. http://dx.doi.org/10.1007/11919568_74.
Full textConference papers on the topic "Mobile User Authentication"
Khare, Karan, and Teng-Sheng Moh. "Mobile gesture-based iPhone user authentication." In 2015 IEEE International Conference on Big Data (Big Data). IEEE, 2015. http://dx.doi.org/10.1109/bigdata.2015.7363929.
Full textChiang, Hsin-Yi, and Sonia Chiasson. "Improving user authentication on mobile devices." In the 15th international conference. ACM Press, 2013. http://dx.doi.org/10.1145/2493190.2493213.
Full textFrolova, Daria, Anna Epishkina, and Konstantin Kogos. "Mobile User Authentication Using Keystroke Dynamics." In 2019 European Intelligence and Security Informatics Conference (EISIC). IEEE, 2019. http://dx.doi.org/10.1109/eisic49498.2019.9108890.
Full textBajwa, Garima, Ram Dantu, and Ryan Aldridge. "Pass-pic: A mobile user authentication." In 2015 IEEE International Conference on Intelligence and Security Informatics (ISI). IEEE, 2015. http://dx.doi.org/10.1109/isi.2015.7165977.
Full textSoonhwa Sung, Cheong Youn, Eunbae Kong, and Jaecheol Ryou. "User authentication using mobile phones for mobile payment." In 2015 International Conference on Information Networking (ICOIN). IEEE, 2015. http://dx.doi.org/10.1109/icoin.2015.7057856.
Full textFindling, Rainhard Dieter, and René Mayrhofer. "Towards device-to-user authentication." In MUM '15: 14th International Conference on Mobile and Ubiquitous Multimedia. ACM, 2015. http://dx.doi.org/10.1145/2836041.2836053.
Full textLi, Chang, Jiwu Jing, and Yuheng Liu. "Mobile user authentication-Turn it to unlock." In ICMAI 2021: 2021 6th International Conference on Mathematics and Artificial Intelligence. ACM, 2021. http://dx.doi.org/10.1145/3460569.3460577.
Full textWang, Kanlun, Lina Zhou, and Dongsong Zhang. "User Preferences and Situational Needs of Mobile User Authentication Methods." In 2019 IEEE International Conference on Intelligence and Security Informatics (ISI). IEEE, 2019. http://dx.doi.org/10.1109/isi.2019.8823274.
Full textAbu Sulayman, Iman I. M., and Abdelkader Ouda. "User Modeling via Anomaly Detection Techniques for User Authentication." In 2019 IEEE 10th Annual Information Technology, Electronics and Mobile Communication Conference (IEMCON). IEEE, 2019. http://dx.doi.org/10.1109/iemcon.2019.8936183.
Full textWang, Xiaoming, and Guoxiang Yao. "User Authentication Scheme for Sensor Networks." In 2010 6th International Conference on Wireless Communications, Networking and Mobile Computing (WiCOM). IEEE, 2010. http://dx.doi.org/10.1109/wicom.2010.5601157.
Full text