Добірка наукової літератури з теми "Android Keystore"

Оформте джерело за APA, MLA, Chicago, Harvard та іншими стилями

Оберіть тип джерела:

Ознайомтеся зі списками актуальних статей, книг, дисертацій, тез та інших наукових джерел на тему "Android Keystore".

Біля кожної праці в переліку літератури доступна кнопка «Додати до бібліографії». Скористайтеся нею – і ми автоматично оформимо бібліографічне посилання на обрану працю в потрібному вам стилі цитування: APA, MLA, «Гарвард», «Чикаго», «Ванкувер» тощо.

Також ви можете завантажити повний текст наукової публікації у форматі «.pdf» та прочитати онлайн анотацію до роботи, якщо відповідні параметри наявні в метаданих.

Статті в журналах з теми "Android Keystore":

1

Huang, Wen Da. "Remote Monitoring of Environment by Android Smartphone through Secure Sockets Layer." Applied Mechanics and Materials 522-524 (February 2014): 80–83. http://dx.doi.org/10.4028/www.scientific.net/amm.522-524.80.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
Анотація:
A multichannel data acquisition device connected to a linux ubuntu computer was used to measure environmental gamma rays intensity and energy spectrum. LabVIEW program stored the data in memory mapped MySQL table during acquisition, java server program sent data to android client through secure sockets layer (SSL). Generation of keystore files and implementation of SSL communication were discussed.
2

Antal, Margit, László Zsolt Szabó, and Izabella László. "Keystroke Dynamics on Android Platform." Procedia Technology 19 (2015): 820–26. http://dx.doi.org/10.1016/j.protcy.2015.02.118.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
3

Zhang, Bao Long, Wei Qi Ding, Shao Jing Zhang, and Hui Shuang Shi. "Realization of Automatic Keystone Correction for Smart Mini Projector Projection Screen." Applied Mechanics and Materials 519-520 (February 2014): 504–9. http://dx.doi.org/10.4028/www.scientific.net/amm.519-520.504.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
Анотація:
With the rapid development of mobile internet, the projector becomes the terminal of mobile internet because of the network module embedded in smart projectors, which can provide a more convenient viewing experience. For traditional mini projector just as simple display equipment, the integration of Android operating system makes mini projector smarter, it is equivalent to a simple PC with projection function. This paper discusses the projection screen keystone distortion phenomenon of mini projector equipped with Android operating system under limiting projection environment because of different placement angle and how to eliminate the above-mentioned distortion, after elaborating the software and hardware architecture of smart mini projector, it focuses upon an analysis on how to achieve automatic correction of the projection screen using the digital acceleration sensor in hardware driver of the Android operating system.
4

Sonawane, Miss Aarti Raman, and Prof Kumbhar H. V. "Graphical-Based Password Keystroke Dynamic Authentication System for Android Phone." IJARCCE 5, no. 12 (December 30, 2016): 377–81. http://dx.doi.org/10.17148/ijarcce.2016.51287.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
5

Pirzado, Farman, Shahzad Memon, Lachman Das Dhomeja Dhomeja, and Awais Ahmed. "Keystroke dynamics Based Technique to Enhance the Security in Smart Devices." KIET Journal of Computing and Information Sciences 4, no. 1 (January 1, 2021): 14. http://dx.doi.org/10.51153/kjcis.v4i1.61.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
Анотація:
Nowadays, smart devices have become a part of ourlives, hold our data, and are used for sensitive transactions likeinternet banking, mobile banking, etc. Therefore, it is crucial tosecure the data in these smart devices from theft or misplacement.The majority of the devices are secured with password/PINbaseduser authentication methods, which are already proveda less secure or easily guessable user authentication method.An alternative technique for securing smart devices is keystrokedynamics. Keystroke dynamics (KSD) is behavioral biometrics,which uses a natural typing pattern unique in every individualand difficult to fake or replicates that pattern. This paperproposes a user authentication model based on KSD as an additionalsecurity method for increasing the smart devices’ securitylevel. In order to analyze the proposed model, an android-basedapplication has been implemented for collecting data from fakeand genuine users. Six machine learning algorithms have beentested on the collected data set to study their suitability for usein the keystroke dynamics-based authentication model.
6

M., Prajakta, Lillita Rhea, Chaitrali Gandhi, and Naman Malik. "The Influence of Emotions on Keystroke Patterns in Android Platform using Auditory Stimuli - An Experimental Study." International Journal of Computer Applications 170, no. 7 (July 17, 2017): 16–19. http://dx.doi.org/10.5120/ijca2017914916.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
7

Caro-Alvaro, Sergio, Eva Garcia-Lopez, Antonio Garcia-Cabot, Luis de-Marcos, and Jose-Javier Martinez-Herraiz. "Identifying Usability Issues in Instant Messaging Apps on iOS and Android Platforms." Mobile Information Systems 2018 (October 10, 2018): 1–19. http://dx.doi.org/10.1155/2018/2056290.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
Анотація:
With the rise of mobile devices and the high number of instant messaging applications available in the stores, it is necessary to evaluate the usability of such applications to provide a more satisfying user experience. To this end, this paper presents a methodical usability evaluation of instant messaging applications both in iOS and Android platforms. A predefined evaluation was used, which was created to detect the main usability issues of mobile applications, regardless of the device used and the evaluated applications. Consequently, two methods were used: the keystroke level model and the mobile heuristic evaluation. Also, the results suggest that the main problems of this type of applications are difficulties in performing tasks (some of them were not agile nor easy to complete), lack of element cohesion (some icons and buttons did not follow the style of the operating system, bad translations, and too much information on the screen), problems with the user interface (pop-ups overlapping the status bar, clipped elements, sometimes the interface did not rotate, and, in other cases, the interface changed considerably when the device was rotated), and lack of information about privacy and security features. Finally, based on the results, we propose a set of recommendations that will be helpful for developers of this kind of applications.
8

Alsuhibany, Suliman A., and Afnan S. Almuqbil. "Analyzing the Effectiveness of Touch Keystroke Dynamic Authentication for the Arabic Language." Wireless Communications and Mobile Computing 2021 (September 10, 2021): 1–15. http://dx.doi.org/10.1155/2021/9963129.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
Анотація:
The keystroke dynamic authentication (KDA) technique was proposed in the literature to develop a more effective authentication technique than traditional methods. KDA analyzes the rhythmic typing of the owner on a keypad or keyboard as a source of verification. In this study, we extend the findings of the system by analyzing the existing literature and validating its effectiveness in Arabic. In particular, we examined the effectiveness of the KDA system in Arabic for touchscreen-based digital devices using two KDA classes: fixed and free text. To this end, a KDA system was developed and applied to a selected device operating on the Android platform, and various classification methods were used to assess the similarity between log-in and enrolment sessions. The developed system was experimentally evaluated. The results showed that using Arabic KDA on touchscreen devices is possible and can enhance security. It attains a higher accuracy with average equal error rates of 0.0% and 0.08% by using the free text and fixed text classes, respectively, implying that free text is more secure than fixed text.
9

Stylios, Ioannis, Spyros Kokolakis, Andreas Skalkos, and Sotirios Chatzis. "BioGames: a new paradigm and a behavioral biometrics collection tool for research purposes." Information & Computer Security 30, no. 2 (December 7, 2021): 243–54. http://dx.doi.org/10.1108/ics-12-2020-0196.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
Анотація:
Purpose The purpose of this paper is to present a new paradigm, named BioGames, for the extraction of behavioral biometrics (BB) conveniently and entertainingly. To apply the BioGames paradigm, the authors developed a BB collection tool for mobile devices named BioGames App. The BioGames App collects keystroke dynamics, touch gestures, and motion modalities and is available on GitHub. Interested researchers and practitioners may use it to create their datasets for research purposes. Design/methodology/approach One major challenge for BB and continuous authentication (CA) research is the lack of actual BB datasets for research purposes. The compilation and refinement of an appropriate set of BB data constitute a challenge and an open problem. The issue is aggravated by the fact that most users are reluctant to participate in long demanding procedures entailed in the collection of research biometric data. As a result, they do not complete the data collection procedure, or they do not complete it correctly. Therefore, the authors propose a new paradigm and introduce a BB collection tool, which they call BioGames, for the extraction of biometric features in a convenient way. The BioGames paradigm proposes a methodology where users play games without participating in an experimental painstaking process. The BioGames App collects keystroke dynamics, touch gestures, and motion modalities. Findings The authors proposed a new paradigm for the collection of BB on mobile devices and created the BioGames application. The BioGames App is an Android application that collects BB data on mobile devices and sends them to a database. The database design allows multiple users to store their sensor data at any time. Thus, there is no concern about data separation and synchronization. BioGames App is General Data Protection Regulation (GDPR) compliant as it collects and processes only anonymous data. Originality/value The BioGames App is a publicly available tool that combines the keystroke dynamics, touch gestures, and motion modalities. In addition, it uses a methodology where users play games without participating in an experimental painstaking process.
10

"Keystroke-based biometric authentication in mobile applications." International Journal of Software Innovation 10, no. 1 (January 2022): 0. http://dx.doi.org/10.4018/ijsi.303574.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
Анотація:
Keystroke dynamics is the study of how people can be distinguished based on their typing rhythms. It is considered as a real alternative to several authentication mechanisms. In order to improve authentication security in mobile applications, especially mobile chat applications , we propose in this work an approach of user keystroke-based authentication which is based on two important mechanisms, firstly the authentication is done on the basis of a supervised classification model trained on the dynamic keystroke database (android platform) the prediction accuracy has reached high values. When the attacker used the same behavior as the legitimate user we are strengthening security by another authentication mechanism based on three parameters during the opening of a communication session between two users (the number of messages per session, connection time and inter-click time). The proposed system has shown satisfactory results by combining user behaviours and connection parameters during an open session between two users to reinforce the authentication aspect.

Дисертації з теми "Android Keystore":

1

Sabt, Mohamed. "Outsmarting smartphones : trust based on provable security and hardware primitives in smartphones architectures." Thesis, Compiègne, 2016. http://www.theses.fr/2016COMP2320.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
Анотація:
Le paysage du monde des téléphones mobiles a changé avec l’introduction des ordiphones (de l’anglais smartphones). En effet, depuis leur avènement, les ordiphones sont devenus incontournables dans des différents aspects de la vie quotidienne. Cela a poussé de nombreux fournisseurs de services de rendre leurs services disponibles sur mobiles. Malgré cette croissante popularité, l’adoption des ordiphones pour des applications sensibles n’a toujours pas eu un grand succès. La raison derrière cela est que beaucoup d’utilisateurs, de plus en plus concernés par la sécurité de leurs appareils, ne font pas confiance à leur ordiphone pour manipuler leurs données sensibles. Cette thèse a pour objectif de renforcer la confiance des utilisateurs en leur mobile. Nous abordons ce problème de confiance en suivant deux approches complémentaires, à savoir la sécurité prouvée et la sécurité ancrée à des dispositifs matériels. Dans la première partie, notre objectif est de montrer les limitations des technologies actuellement utilisées dans les architectures des ordiphones. À cette fin, nous étudions deux systèmes largement déployés et dont la sécurité a reçu une attention particulière dès la conception : l’entrepôt de clés d’Android, qui est le composant protégeant les clés cryptographiques stockées sur les mobiles d’Android, et la famille des protocoles sécurisés SCP (de l’anglais Secure Channel Protocol) qui est définie par le consortium GlobalPlatform. Nos analyses se basent sur le paradigme de la sécurité prouvée. Bien qu’elle soit perçue comme un outil théorique voire abstrait, nous montrons que cet outil pourrait être utilisé afin de trouver des vulnérabilités dans des systèmes industriels. Cela atteste le rôle important que joue la sécurité prouvée pour la confiance en étant capable de formellement démontrer l’absence de failles de sécurité ou éventuellement de les identifier quand elles existent. Quant à la deuxième partie, elle est consacrée aux systèmes complexes qui ne peuvent pas être formellement vérifiés de manière efficace en termes de coût. Nous commençons par examiner l’approche à double environnement d’exécution. Ensuite, nous considérons le cas où cette approche est instanciée par des dispositifs matériels particuliers, à savoir le ARM TrustZone, afin de construire un environnement d’exécution de confiance (TEE de l’anglais Trusted Execution Environment). Enfin, nous explorons deux solutions palliant quelques limitations actuelles du TEE. Premièrement, nous concevons une nouvelle architecture du TEE qui en protège les données sensibles même quand son noyau sécurisé est compromis. Cela soulage les fournisseurs des services de la contrainte qui consiste à faire pleinement confiance aux fournisseurs du TEE. Deuxièmement, nous proposons une solution dans laquelle le TEE n’est pas uniquement utilisé pour protéger l’exécution des applications sensibles, mais aussi pour garantir à des grands composants logiciels (comme le noyau d’un système d’exploitation) des propriétés de sécurité plus complexes, à savoir l’auto-protection et l’auto-remédiation
The landscape of mobile devices has been changed with the introduction of smartphones. Sincetheir advent, smartphones have become almost vital in the modern world. This has spurred many service providers to propose access to their services via mobile applications. Despite such big success, the use of smartphones for sensitive applications has not become widely popular. The reason behind this is that users, being increasingly aware about security, do not trust their smartphones to protect sensitive applications from attackers. The goal of this thesis is to strengthen users trust in their devices. We cover this trust problem with two complementary approaches: provable security and hardware primitives. In the first part, our goal is to demonstrate the limits of the existing technologies in smartphones architectures. To this end, we analyze two widely deployed systems in which careful design was applied in order to enforce their security guarantee: the Android KeyStore, which is the component shielding users cryptographic keys in Android smartphones, and the family of Secure Channel Protocols (SCPs) defined by the GlobalPlatform consortium. Our study relies on the paradigm of provable security. Despite being perceived as rather theoretical and abstract, we show that this tool can be handily used for real-world systems to find security vulnerabilities. This shows the important role that can play provable security for trust by being able to formally prove the absence of security flaws or to identify them if they exist. The second part focuses on complex systems that cannot cost-effectively be formally verified. We begin by investigating the dual-execution-environment approach. Then, we consider the case when this approach is built upon some particular hardware primitives, namely the ARM TrustZone, to construct the so-called Trusted Execution Environment (TEE). Finally, we explore two solutions addressing some of the TEE limitations. First, we propose a new TEE architecture that protects its sensitive data even when the secure kernel gets compromised. This relieves service providers of fully trusting the TEE issuer. Second, we provide a solution in which TEE is used not only for execution protection, but also to guarantee more elaborated security properties (i.e. self-protection and self-healing) to a complex software system like an OS kernel
2

Lin, Jyun-Hao, and 林俊豪. "Keystroke Dynamic PIN-based and Graphical-based Authentication System - Implemented in Android Compatible Phone." Thesis, 2011. http://ndltd.ncl.edu.tw/handle/67258930883548991161.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
Анотація:
碩士
國立彰化師範大學
數位學習研究所
99
Since the touch screen handheld mobile devices have become widely used, people are able to conveniently access various data and information anywhere. Most user authentication methods for these mobile devices are PIN-based (Person Identification Number) authentication. However, PINs consist of 4 to 8 numbers and then it suffers from guessing and shoulder surfing attacks easily. Many studies have employed the KDA (Keystroke Dynamics-based Authentication) system, which verifies PIN correctness and also verifies the corresponding individual keystroke features. It provides additional security verification for PIN-based authentication. Unfortunately, unlike the text-based password KDA systems in QWERTY keyboards, different keypad sizes or layouts of mobile devices affect the PIN-based KDA system utility. In this study, the accuracy of authenticating the keystroke features are not affected by inconsistent keypads since the PINs is entered via the identical size of human-computer interface. Moreover, except for the original keystroke time features in the KDA systems, two novel keystroke features are found in touch screen handheld mobile devices, which are called "pressure" features and "size" features. This study uses these features to improve the keystroke data quality of PIN-based KDA system. On the other hand, we propose a new graphical-based password KDA system for touch screen handheld mobile devices. The proposed system uses graphical password to enlarge the password space size and uses the pressure features to improve the keystroke data quality. A user also enter his/her graphical password via the identical size of human-computer interface. Under this situation, the graphical-based password KDA system is able to promote the PIN-based KDA system utility in touch screen handheld mobile devices.

Частини книг з теми "Android Keystore":

1

Sabt, Mohamed, and Jacques Traorè. "Breaking into the KeyStore: A Practical Forgery Attack Against Android KeyStore." In Computer Security – ESORICS 2016, 531–48. Cham: Springer International Publishing, 2016. http://dx.doi.org/10.1007/978-3-319-45741-3_27.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
2

Theofilou, Savvas, Nikolas Vardas, and Christos Katsanos. "FLM-2A: Towards Automated HCI Modeling of Android Applications Based on a Modified Version of the Keystroke Level Model." In Human-Computer Interaction. Theory, Methods and Tools, 329–42. Cham: Springer International Publishing, 2021. http://dx.doi.org/10.1007/978-3-030-78462-1_25.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.

Тези доповідей конференцій з теми "Android Keystore":

1

El Zein, Dima, and Ali Kalakech. "Feature Selection for Android Keystroke Dynamics." In 2018 International Arab Conference on Information Technology (ACIT). IEEE, 2018. http://dx.doi.org/10.1109/acit.2018.8672706.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
2

Elmiligi, Haytham, and Sherif Saad. "iProfile: Collecting and Analyzing Keystroke Dynamics from Android Users." In 8th International Conference on Information Systems Security and Privacy. SCITEPRESS - Science and Technology Publications, 2022. http://dx.doi.org/10.5220/0011002600003120.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
3

Putri, Alifa Nurani, Yudistira Dwi Wardhana Asnar, and Saiful Akbar. "A continuous fusion authentication for Android based on keystroke dynamics and touch gesture." In 2016 International Conference on Data and Software Engineering (ICoDSE). IEEE, 2016. http://dx.doi.org/10.1109/icodse.2016.7936146.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
4

Nasution, Surya Michrandi, Yudha Purwanto, Agus Virgono, and M. Faris Ruriawan. "Modified kleptodata for spying soft-input keystroke and location based on Android mobile device." In 2015 International Conference on Information Technology Systems and Innovation (ICITSI). IEEE, 2015. http://dx.doi.org/10.1109/icitsi.2015.7437700.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
5

Benjapatanamongkol, Nareerat, and Pattarasinee Bhattarakosol. "A Preliminary Study of Finger Area and Keystroke Dynamics Using Numeric Keypad With Random Numbers on Android Phones." In 2019 23rd International Computer Science and Engineering Conference (ICSEC). IEEE, 2019. http://dx.doi.org/10.1109/icsec47112.2019.8974686.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
6

Gautam, Prakash, and Pankaj Raj Dawadi. "Keystroke biometric system for touch screen text input on android devices optimization of equal error rate based on medians vector proximity." In 2017 11th International Conference on Software, Knowledge, Information Management and Applications (SKIMA). IEEE, 2017. http://dx.doi.org/10.1109/skima.2017.8294136.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.

До бібліографії