To see the other types of publications on this topic, follow the link: Mobile User Authentication.

Dissertations / Theses on the topic 'Mobile User Authentication'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the top 33 dissertations / theses for your research on the topic 'Mobile User Authentication.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Browse dissertations / theses on a wide variety of disciplines and organise your bibliography correctly.

1

Hallsteinsen, Steffen Gullikstad. "A study of user authentication using mobile phone." Thesis, Norwegian University of Science and Technology, Department of Telematics, 2007. http://urn.kb.se/resolve?urn=urn:nbn:no:ntnu:diva-8817.

Full text
Abstract:
<p>The number of different identities and credentials used for authentication towards services on the Internet has increased beyond the manageable. Still, the most common authentication scheme is based on usernames and passwords which are neither secure nor user-friendly. Hence, better solutions for simplified, yet secure authentication, is required in the future. This thesis present an authentication scheme based on a One-Time Password (OTP) MIDlet running on a mobile phone for unified authentication towards any type of service on the Internet. The scheme is described in detail by an analysi
APA, Harvard, Vancouver, ISO, and other styles
2

Karatzouni, Sevasti. "Non-intrusive continuous user authentication for mobile devices." Thesis, University of Plymouth, 2014. http://hdl.handle.net/10026.1/3225.

Full text
Abstract:
The modern mobile device has become an everyday tool for users and business. Technological advancements in the device itself and the networks that connect them have enabled a range of services and data access which have introduced a subsequent increased security risk. Given the latter, the security requirements need to be re-evaluated and authentication is a key countermeasure in this regard. However, it has traditionally been poorly served and would benefit from research to better understand how authentication can be provided to establish sufficient trust. This thesis investigates the securit
APA, Harvard, Vancouver, ISO, and other styles
3

Saevanee, Hataichanok. "Continuous user authentication using multi-modal biometrics." Thesis, University of Plymouth, 2014. http://hdl.handle.net/10026.1/3033.

Full text
Abstract:
It is commonly acknowledged that mobile devices now form an integral part of an individual’s everyday life. The modern mobile handheld devices are capable to provide a wide range of services and applications over multiple networks. With the increasing capability and accessibility, they introduce additional demands in term of security. This thesis explores the need for authentication on mobile devices and proposes a novel mechanism to improve the current techniques. The research begins with an intensive review of mobile technologies and the current security challenges that mobile devices experi
APA, Harvard, Vancouver, ISO, and other styles
4

Hocking, Christopher George. "Authentication aura : a cooperative and distributed approach to user authentication on mobile devices." Thesis, University of Plymouth, 2015. http://hdl.handle.net/10026.1/3469.

Full text
Abstract:
As information technology pervades our lives we have increasingly come to rely on these evermore sophisticated and ubiquitous items of equipment. Portability and the desire to be connected around the clock has driven the rapid growth in adoption of mobile devices that enable us to talk, message, tweet and inform at will, whilst providing a means to shop and administer bank accounts. These high value, high risk, desirable devices are increasingly the target of theft and improvement in their protection is actively sought by Governments and security agencies. Although forms of security are in pla
APA, Harvard, Vancouver, ISO, and other styles
5

Molla, Rania A. "Mobile user authentication system (MUAS) for e-commerce applications." Thesis, Edinburgh Napier University, 2017. http://researchrepository.napier.ac.uk/Output/1035289.

Full text
Abstract:
The rapid growth of e-commerce has many associated security concerns. Thus, several studies to develop secure online authentication systems have emerged. Most studies begin with the premise that the intermediate network is the primary point of compromise. In this thesis, we assume that the point of compromise lies within the end-host or browser; this security threat is called the man-in-the-browser (MITB) attack. MITB attacks can bypass security measures of public key infrastructures (PKI), as well as encryption mechanisms for secure socket layers and transport layer security (SSL/TLS) protoco
APA, Harvard, Vancouver, ISO, and other styles
6

Ben, Tahayekt Ben Tahaikt Chaimaa. "A secure user authentication scheme for critical mobile applications." Thesis, Mälardalens högskola, Akademin för innovation, design och teknik, 2017. http://urn.kb.se/resolve?urn=urn:nbn:se:mdh:diva-34845.

Full text
Abstract:
Smartphones have facilitated tasks in private and work life for its users. In business, employees often should manage sensitive data that unauthorised people cannot access, so some user authentication is needed to perform. Besides the normal user authentication, some employers give the right to access to the sensitive data only if the employees stay in specific locations. That makes sense for those businesses that have various construction sites and offices that are not necessarily located in the same geographical region. In those companies, the employees must be able to perform their tasks fr
APA, Harvard, Vancouver, ISO, and other styles
7

Du, Tiantian, and Amro Agami. "Examining young users’ security perceptions of mobile banking : A qualitative study on users’ insights about mobile banking." Thesis, Umeå universitet, Företagsekonomi, 2017. http://urn.kb.se/resolve?urn=urn:nbn:se:umu:diva-141655.

Full text
Abstract:
The advancement of mobile technology and banking services enabled users to use the mobile banking for a variety of tasks with their smartphones, bringing increased flexibility and value-added services to the customers. However, users still have still concerns regarding the security of mobile banking services. The lack of knowledge of the user about different security threats and mechanisms to improve their security represent a major opportunity for hackers and cyberattacks. Despite the fact that the younger students are more knowledgeable about technologies yet awareness is still a concern. Pe
APA, Harvard, Vancouver, ISO, and other styles
8

Zezschwitz, Emanuel von [Verfasser], and Heinrich [Akademischer Betreuer] Hußmann. "Risks and potentials of graphical and gesture-based authentication for touchscreen mobile devices : balancing usability and security through user-centered analysis and design / Emanuel von Zezschwitz ; Betreuer: Heinrich Hußmann." München : Universitätsbibliothek der Ludwig-Maximilians-Universität, 2016. http://d-nb.info/1123957452/34.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Mapoka, Trust Tshepo. "Location based authenticated multi-services group key management for cyber security in high speed broadband wireless multicast communications : multi-service group key management scheme with location based handover authentication for multi-handoffs participating in multi-group service subscriptions, its performance evaluation and security correctness in high speed broadband wireless multicast communications." Thesis, University of Bradford, 2015. http://hdl.handle.net/10454/14468.

Full text
Abstract:
Secure information exchanges over cyberspace is on the increase due to the convergence of wireless and mobile access technologies in all businesses. Accordingly, with the proliferation of diverse multicast group service subscriptions that are possible to co-exist within a single broadband network, there is also huge demand by the mobile subscribers to ubiquitously access these services over high speed broadband using their portable devices. Likewise, the Network Providers (NPs) invest hugely in infrastructure deployment to disseminate these services efficiently and concomitantly. Therefore, cy
APA, Harvard, Vancouver, ISO, and other styles
10

Porubsky, Jakub. "Biometric Authentication in M-Payments : Analysing and improving end-users’ acceptability." Thesis, Luleå tekniska universitet, Institutionen för system- och rymdteknik, 2020. http://urn.kb.se/resolve?urn=urn:nbn:se:ltu:diva-79221.

Full text
Abstract:
Traditional authentication methods like Personal Identification Number (PIN) are getting obsolete and insecure for electronic-payments while mobile-payments are becoming more and more popular. Biometrics such as fingerprint and face recognition authentication methods seem to be a solution to this security issue as they are becoming a regular and integrated part of an average smartphone end-users purchase. However, for mobile-payments to be authenticated by biometrics, end-users acceptability of both technologies must be high. In this research, fingerprint and face recognition authentication me
APA, Harvard, Vancouver, ISO, and other styles
11

Zhang, Zhen. "Delivering mobile services to mobile users in open networks: Quality of service, authentication and trust-based access control." Thesis, University of Ottawa (Canada), 2008. http://hdl.handle.net/10393/27745.

Full text
Abstract:
This thesis describes scenarios in which a mobile user needs various services, such as Internet telephony, secure printing and online data services in a number of places. From these scenarios we summarize the requirements for quality of service control, service discovery, user authentication and authorization, service access control, and user privacy. In order to implement a prototype to support service discovery, we studied different technologies including Bluetooth, Jini, and Web Services. SDPtool from BlueZ was chosen to limit the search range within the user's local area while using minima
APA, Harvard, Vancouver, ISO, and other styles
12

Lee, Cheng-Chi, and 李正吉. "User Authentication Schemes for Mobile Communications." Thesis, 2001. http://ndltd.ncl.edu.tw/handle/08617463212772249246.

Full text
Abstract:
碩士<br>朝陽科技大學<br>資訊管理系碩士班<br>89<br>Today, mobile communication is widespread in the world and its technologies have undergone rapid development. It brings convenience to people in their daily life, such that each user can communicate and transfer data with others at any place, at any time. Despite the convenience of mobile communication, an important issue, the security of communication, has drawn the attention of researchers and manufactures. There are two major security requirements, privacy and authentication, in m
APA, Harvard, Vancouver, ISO, and other styles
13

Chen, Chiou-Nan, and 陳秋男. "User Authentication in Mobile Satellite Communication System." Thesis, 1999. http://ndltd.ncl.edu.tw/handle/60878481091035184231.

Full text
Abstract:
碩士<br>國立中興大學<br>資訊科學研究所<br>87<br>Mobile Satellite Communication System (MSCS) is a world-wide wireless communication network which is constructed from a dozen or hundreds of Low Earth Orbit (LEO) communication satellites. MSCS can provide high speed and high bandwidth communication services beyond the geographic environment limits. Therefore, MSCS will be a shining nova in the 21st century. Up to now, many MSCS building projects have been proposed, but without mature security considerations. In this thesis, we study the security issues in MSCS, and propose a Mobile User Authentication method b
APA, Harvard, Vancouver, ISO, and other styles
14

Chen, Yi-Fu, and 陳義夫. "Roaming User Authentication Scheme in Mobile Network." Thesis, 2011. http://ndltd.ncl.edu.tw/handle/49791928465159698545.

Full text
Abstract:
碩士<br>淡江大學<br>資訊工程學系資訊網路與通訊碩士班<br>99<br>This research proposes an authentication mechanism for roaming users of mobile networks. Thanks to the rapid development of Internet and wireless communications, users can access to wireless Internet services through mobile devices. Since humans are mobile by nature, they may access Internet with their wireless or mobile devices via a foreign agent. This phenomenon is called roaming. Allowing foreign agents to identify legal users among other cooperating networks is thus an essential issue to keep mobile network security with effective management reachab
APA, Harvard, Vancouver, ISO, and other styles
15

Chung, Chin-Hwei, and 鍾慶輝. "Humancrypt- Based User Authentication Protocol for Mobile Communication." Thesis, 2010. http://ndltd.ncl.edu.tw/handle/77947457183330257340.

Full text
Abstract:
碩士<br>亞洲大學<br>資訊工程學系碩士班<br>98<br>With the rapid development of the information technology, people’s demand for the mobile services increases dramatically. Here goes along with the opportunity and interest. For this reason, amounts of mobile service providers and scholars start to research on this topic in order to provide a more complete and secure user platform. Because of the progress of technology, users utilize the mobile service to surf on the internet instead of merely voice transmission. However, there might be risk to transmit the radio wave in open environments, so the issues about in
APA, Harvard, Vancouver, ISO, and other styles
16

Tseng, Ting-Hsuan, and 曾亭媗. "Location-based Authentication Protocols for Mobile User Environments." Thesis, 2016. http://ndltd.ncl.edu.tw/handle/42712704702185575255.

Full text
Abstract:
碩士<br>國立臺灣科技大學<br>資訊管理系<br>104<br>With the increasing popularity of mobile devices, services can be accessed via wireless networks anytime and anywhere. However, the wireless environment has more security threats than wired networks. Therefore, this thesis is concerned with the mobility of mobile devices and security threats in wireless networks, such as unauthorized access, data integrity, etc. We proposed an authentication and authorization mechanism for mobile devices in various environments. The application environments can be divided into household and public location environments with th
APA, Harvard, Vancouver, ISO, and other styles
17

Chih-Hao, Hsu, and 許智皓. "Mobile User Authentication Mechanisms on Multi-server Cloud Environment." Thesis, 2013. http://ndltd.ncl.edu.tw/handle/74151980125133266347.

Full text
Abstract:
碩士<br>開南大學<br>資訊及電子商務學系<br>101<br>The Mobile User Authentication scheme is a protection technique which protects and manages the access rights of digital contents. It can prevent the confidential information of digital content from unauthorized usages by illegal users. The Mobile User Authentication scheme also supports the content authors to specify their access rights for their digital content, such as reading and editing rights. Thus, after user authentication whether their digital contents can be edited or viewed by an authorized user. The users can easily access these services via the Int
APA, Harvard, Vancouver, ISO, and other styles
18

Chang, Ling-Ling, and 張翎翎. "Shoulder-surfing resistant authentication based on mobile user behavior." Thesis, 2016. http://ndltd.ncl.edu.tw/handle/01859613134611451019.

Full text
Abstract:
碩士<br>銘傳大學<br>電腦與通訊工程學系碩士班<br>104<br>In recent years, due to the popularity of smartphones, users can use smart devices as a platform for internet services anywhere and anytime. That is to say, a growing number of private messages will be stored on smart devices, so smart devices have been used with many different methods of authentication. But common authentication system is difficult to against shoulder surfing attacks. Many types of research were proposed to resist shoulder surfing attack, but some methods are too complicated. In this study, we proposed a multi-touch gesture authentication
APA, Harvard, Vancouver, ISO, and other styles
19

Wu, Shin-Han, and 吳信翰. "A Study on User Authentication Mechanism in Mobile Network." Thesis, 2007. http://ndltd.ncl.edu.tw/handle/18109802492410541415.

Full text
Abstract:
碩士<br>世新大學<br>資訊管理學研究所(含碩專班)<br>95<br>Owing to the domestic Third Generation corporations established and popularized by the telecommunication services, the opportunities for consumers to use the telecommunication services with handset devices are increasing. Although consumers enjoy the convenience of telecommunication services, they simultaneously consider the invisible threat in mobile networks. In order to provide consumers with secure and convenient telecommunication services, authentication plays a very important role in the entire mobile network system, acting as the first defense again
APA, Harvard, Vancouver, ISO, and other styles
20

Almotairi, Khaled Hatem. "Credit-Based User Authentication for Delay Tolerant Mobile Wireless Networks." Thesis, 2007. http://hdl.handle.net/10012/3498.

Full text
Abstract:
Wireless Internet has become increasingly popular due to anywhere anytime access feature. The Internet architecture was designed underlying the existing of the end-to-end path connection. The promise of wireless Internet networks is to provide roaming users connectivity anywhere anytime. However, quality of service (QoS) is still an open issue in wireless networks, which are characterized by possible intermittent connectivity and large transmission delays, due to user mobility, sparse mobile node distribution, link failures (because of hostile propagation medium), and/or other high-priority tr
APA, Harvard, Vancouver, ISO, and other styles
21

Chang, Hui Yu, and 張惠喻. "A Biometric-based Remote User Authentication Using Smart Mobile Devices." Thesis, 2013. http://ndltd.ncl.edu.tw/handle/72153052001854432711.

Full text
Abstract:
碩士<br>國立中興大學<br>資訊科學與工程學系所<br>101<br>Nowadays, intelligent mobile devices affect people’s live style and the demand of software. Moreover, intelligent mobile devices encourage the software industry to develop rapidly. Remote user authentication of e-commerce and m-commerce has become one of the important security issues. With the improvement of hardware of intelligent mobile device, equipped with advanced camera which takes HD photos, a close-up micrograph is the developing direction of all manufacturers. In 2012, Khaalil and Kurniawan proposed to use the build in camera on intelligent mobile
APA, Harvard, Vancouver, ISO, and other styles
22

Cheng, An-Che, and 鄭安哲. "User Authentication via Touch Dynamic in NFC Mobile Payment Environment." Thesis, 2014. http://ndltd.ncl.edu.tw/handle/fz4dkd.

Full text
Abstract:
碩士<br>國立雲林科技大學<br>資訊管理系<br>102<br>According to the study, the market scale of the global Near Field Communication mobile payments is very large in recent years, so that the user authentication security issues become very critical. Nowadays, the authentication mechanism of users is mostly based on password. Recently, biometric-based user authentication has become the trend. In the near field communication mobile payment environment, used the authentication which based on behavioral biometric for user authentication to increase security of the near field communication mobile payments. This study
APA, Harvard, Vancouver, ISO, and other styles
23

HSIEH, CHUN-TING, and 謝春霆. "An Anonymous Authentication Scheme for Mobile User Roaming in Networks." Thesis, 2017. http://ndltd.ncl.edu.tw/handle/42137357297244482976.

Full text
Abstract:
碩士<br>中國文化大學<br>資訊管理學系<br>105<br>With the rapid development of communication technology, people use the network service by the mobile device when traveling at other countries. However, a user needs to verify by the local server in order to use the network service that is provided by the foreign server. Therefore, the secure authentication scheme for roaming with mobile device becomes more important. In 2015, Farash et al. pointed out Shin et al.’s and Wen et al.’s schemes exist several security flaws, then proposed an enhanced scheme to fix the weakness. In 2016, Islam et al. showed Lin et al.
APA, Harvard, Vancouver, ISO, and other styles
24

Chen, Wei Yao, and 陳惟堯. "Sequential Multi-Fingerprinting Based Remote User Authentication on Mobile Devices." Thesis, 2014. http://ndltd.ncl.edu.tw/handle/78122041681706419484.

Full text
Abstract:
碩士<br>東海大學<br>資訊管理學系<br>102<br>With the rapid development of wireless communication technology and cloud computing services, the development and application of mobile devices will become more popularity. People can use the Internet anytime, anywhere, and perform access, transmission and processing of remote data. In order to ensure the mobile commerce security in the future cloud computing environment, the remote authentication scheme will be more important on mobile devices application.In 2006, Khan et al proposed a fingerprint-based remote user authentication scheme using mobile devices, thi
APA, Harvard, Vancouver, ISO, and other styles
25

Chen, Shih-Pin, and 陳世斌. "A Study of User Authentication Protocols in Mobile Communication System." Thesis, 2001. http://ndltd.ncl.edu.tw/handle/81235844231006228108.

Full text
Abstract:
碩士<br>國立中興大學<br>資訊科學研究所<br>89<br>Recently, with the development of computer and communication technology, the amount of wireless communication users has rapidly grown. Now we can communicate with other people at anytime, anywhere. In the future, people will more and more rely on this technology. As we enjoy this convenience, we should notice that the transmission media is radio channel. And the radio channel is vulnerable to eavesdropping by unauthorized users. How to prevent illegal users from passive eavesdropping and active tampering is an emergent topic. There are many authentic
APA, Harvard, Vancouver, ISO, and other styles
26

Mapoka, Trust T., Simon J. Shepherd, Kelvin O. O. Anoh, Raed A. Abd-Alhameed, Yousef A. S. Dama, and Haider M. AlSabbagh. "Improving authentication function in wireless mobile multicast communications." 2015. http://hdl.handle.net/10454/9193.

Full text
Abstract:
No<br>In this paper a distributed authentication scheme based on independent session key per access network (HOISKA) is proposed for the decentralized multi-service group key management scheme in a wireless multicast environment. It enables a handover user Mi involved in multiple multicast service subscriptions to establish the long term credential from the trusted authentication server (As) during initial registration. The Mi then securely reuses the long term credential established to derive unique session keys per access network during handover across diverse access networks. The distribute
APA, Harvard, Vancouver, ISO, and other styles
27

Chiou, Tai-Yuan, and 邱泰源. "OTP User Authentication of Value-added Applications for Mobile Network Management." Thesis, 2011. http://ndltd.ncl.edu.tw/handle/43180826283032633628.

Full text
Abstract:
碩士<br>清雲科技大學<br>資訊管理所<br>99<br>Recently, smart phone peripheral devices have the widest application with the functions of a camera, Global Positioning System and remote desktop connection. Their research and development has become more diverse development. Because of sophisticated wireless network environment effect on mobile network management, it has brought about many of the actions generated demand for computer network management and mobile security issues. Symantec Corporation’s experts argue that hacker detected user computer information and changed network equipment system settings with
APA, Harvard, Vancouver, ISO, and other styles
28

Perez, Luís Paulo Lemos. "Seamless and Strong Authentication on Mobile Devices Based on User Activity." Master's thesis, 2015. http://hdl.handle.net/10400.6/6010.

Full text
Abstract:
In 2015, the number of mobile devices (e.g., smartphones, tablets, phablets, etc.) exceeded the number of physical computers worldwide. The physical characteristics of these devices are constantly evolving. Increased autonomy, storage and processing capacity, as well as functionality are factors that lead people to buy more and more of these devices. There are thousands of applications for many different areas, that can be can be installed and used on daily-basis, ranging from finantial applications, to health, games, movies, and utilities, etc. Users increasingly rely on these devices,
APA, Harvard, Vancouver, ISO, and other styles
29

Wu, Tien-Han, and 吳典翰. "Protecting Privacy of Mobile Devices Using Continuous Authentication Based on User Behavior." Thesis, 2016. http://ndltd.ncl.edu.tw/handle/76027957630415983455.

Full text
Abstract:
碩士<br>國立臺灣大學<br>電機工程學研究所<br>104<br>In recent years, mobile devices are nearly indispensable in our daily lives; for instance, message, Facebook, and credit card number. Therefore, privacy of personal information on mobile devices has become an important issue. Hence, this paper proposes a new approach continuously protecting the user information from an impostor’s attack. The approach detects whether the current users of mobile devices are actual owners or impostors. From the result of our experiment, we observed that our approach obtains the lower equal error rate than that of the related wor
APA, Harvard, Vancouver, ISO, and other styles
30

wu, Chia-Ying, and 吳佳盈. "The Study on Some User Authentication and Key Agreement Protocols for Mobile Client-Server Environment." Thesis, 2011. http://ndltd.ncl.edu.tw/handle/73158664853774567979.

Full text
Abstract:
碩士<br>亞洲大學<br>光電與通訊學系碩士班<br>99<br>With the rapid development of Internet service the client/server architecture, a lot of people use the Internet to organize a conference or to communicate with each other such as e-mail even though they located in different places in the world. However, the network is a shared medium, so that it’s full of weakness security attacks such as eavesdropping and modification attack. Hence, information security becomes an important issue in the client/server environment. So far, many protocols have been proposed to achieve different purpose. Most of them have to achi
APA, Harvard, Vancouver, ISO, and other styles
31

Tseng, Yun-ru, and 曾筠茹. "A Study on User Authentications of Mobile Communications." Thesis, 2014. http://ndltd.ncl.edu.tw/handle/8yy945.

Full text
Abstract:
碩士<br>大同大學<br>資訊經營學系(所)<br>102<br>Due to the rapid development on Internet and various 3C Products, user has convenient access to the Internet and can browse information easily by Laptop, Smartphone or Tablet. Situated in the network environment, users are changing their consuming habits. For example, more and more people are shopping online or getting services through mobile device instead of going to the store personally. They also use mobile device or near-field sensing to make payment directly or indirectly. In such an environment, information security problem emerges and user identity aut
APA, Harvard, Vancouver, ISO, and other styles
32

Lee, Cheng-Chi, and 李正吉. "MOBILE USERS PRIVACY AND AUTHENTICATION IN WIRELESS COMMUNICATION SYSTEMS." Thesis, 2007. http://ndltd.ncl.edu.tw/handle/61845963901402108451.

Full text
Abstract:
博士<br>中興大學<br>資訊科學系所<br>95<br>Since wireless communication is gaining popularity in recent years, people can roam freely and use the mobile service almost everywhere. Many mobile service systems, such as the Personal Communication Systems (PCS), the Global System of Mobile communications (GSM), and the Universal Mobile Communication System (UMTS), have been developed and have become very popular around the world. It brings so much convenience for people''s life that anyone can use it to communicate with anyone else in almost any place at any time. However, people are most worried about two maj
APA, Harvard, Vancouver, ISO, and other styles
33

Yu, Wen-Lin, and 游文霖. "A Framework of Authenticating Mobile Phone Users using Touch Screen and Accelerometers Data." Thesis, 2014. http://ndltd.ncl.edu.tw/handle/y6947j.

Full text
Abstract:
碩士<br>國立清華大學<br>資訊工程學系<br>102<br>Smartphones have become very popular in recent years. Nowadays, almost everyone has a smartphone. Smartphones are getting more powerful and have more functions than before. You can transfer money, save photos, or buy an application for a smart phone. For these reasons, smartphones have more and more privacy issues than before. Google already proposed a few locking features in an android device, like graphical pattern lock or PIN code lock. Although these kinds of unlock phone features keep the devices safe when the owner is not near the mobile phone, users have
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!