Mobile banking is attractive because it allows people to do banking anytime, anywhere. One of the requirements of performing a mobile banking transaction is that users are required to login before use. The current mobile banking login method is PIN authentication; however, results from other research studies have found that there are usability concerns of using PINs. To overcome some of the concerns, researchers have suggested the use graphical passwords. In this research, we argue that another alternative input technique can be utilized. We explore a novel password input approach, called gesture passwords, of using 3-dimensional discrete gesture motions as password elements. As a result, three systems (PINs, graphical passwords and gesture...
The invention of mobile phones makes the human life easier. The purpose of this study is to identify...
Typing text passwords is challenging when using touchscreens on mobile devices and this is becoming ...
Mobile devices with wireless network capabilities can be associated to form ad hoc networks to share...
Mobile banking is attractive because it allows people to do banking anytime, anywhere. One of the re...
Includes abstract.Also available online.This dissertation describes the design of two mobile authent...
User Authentication is a vital component in any Information System. There are various ways of imple...
Text passwords are still the primary authentication mechanism for computers and online systems world...
Abstract — Recently, mobile phones have become an important tool to carry out financial transactions...
Abstract — Graphical password using cued click points is one of the alternative and better solutions...
Part 2: Authentication and AuthorizationInternational audienceGraphical password based authenticatio...
The usability and security issues associated with mobile banking user authentication techniques and ...
Upcoming mobile devices will have flexible displays, allowing us to explore alternate forms of user ...
Research in user authentication has been a growing field in HCI. Previous studies have shown that pe...
In this Paper [5], A highly severe menace to any computing device is the impersonation of an authent...
Context: The invention of mobile phones makes the human life easier. The purpose of this study is to...
The invention of mobile phones makes the human life easier. The purpose of this study is to identify...
Typing text passwords is challenging when using touchscreens on mobile devices and this is becoming ...
Mobile devices with wireless network capabilities can be associated to form ad hoc networks to share...
Mobile banking is attractive because it allows people to do banking anytime, anywhere. One of the re...
Includes abstract.Also available online.This dissertation describes the design of two mobile authent...
User Authentication is a vital component in any Information System. There are various ways of imple...
Text passwords are still the primary authentication mechanism for computers and online systems world...
Abstract — Recently, mobile phones have become an important tool to carry out financial transactions...
Abstract — Graphical password using cued click points is one of the alternative and better solutions...
Part 2: Authentication and AuthorizationInternational audienceGraphical password based authenticatio...
The usability and security issues associated with mobile banking user authentication techniques and ...
Upcoming mobile devices will have flexible displays, allowing us to explore alternate forms of user ...
Research in user authentication has been a growing field in HCI. Previous studies have shown that pe...
In this Paper [5], A highly severe menace to any computing device is the impersonation of an authent...
Context: The invention of mobile phones makes the human life easier. The purpose of this study is to...
The invention of mobile phones makes the human life easier. The purpose of this study is to identify...
Typing text passwords is challenging when using touchscreens on mobile devices and this is becoming ...
Mobile devices with wireless network capabilities can be associated to form ad hoc networks to share...