In this thesis we present a scheme for automating authentication based on social factors using mobile phones. We test its feasibility by running simulations on an existing dataset. We implement two protocols one based on public key infrastructure and the other on hash chains. Then we consider possible threat scenarios.Web applications such as online banking, online shopping carts, and so on, depend on the user authenticating himself securely. Traditionally this involves a username and password and if more security is required an electronic token is used in addition to this password. Other than these two "factors" there is also biometrics, such as fingerprints, retinal scans and voice recognition. Thus the traditional systems use some combin...
In this paper we propose a new biometric measure to authenticate the user of a smartphone: the movem...
The widespread usage of smartphones gives rise to new security and privacy concerns. Smartphones are...
Smartphones are context-aware devices that provide a compelling platform for ubiquitous computing an...
In our daily life, the smartphone became an unavoidable tool to perform our common tasks.Accessing t...
Pervasive in nature and extensively used for a wide range of features, smartphone provides functiona...
There has been tremendous growth of mobile devices, which includes mobile phones, tablets etc. in re...
Mobile devices are increasingly used to store private and sensitive data, and this has led to an i...
The growing market of mobile devices forces to question about how to protect users’ credentials and ...
Nowadays, authentication is usually done by using username and password. They are common and can pr...
Bachelor’s thesis describes the basics of authentication methods by knowledge, used authentication t...
The use of mobile devices has extended to all areas of human life and has changed the way people wor...
Smartphones are the most popular and widespread personal devices. Apart from their conventional use,...
The growth in smartphone usage has led to increased user concerns regarding privacy and security. Sm...
User authentication is an essential task to contribute to efficient security of IT systems. Innovati...
In this thesis, we design three new authentication mechanisms based on user identity. Therefore, we ...
In this paper we propose a new biometric measure to authenticate the user of a smartphone: the movem...
The widespread usage of smartphones gives rise to new security and privacy concerns. Smartphones are...
Smartphones are context-aware devices that provide a compelling platform for ubiquitous computing an...
In our daily life, the smartphone became an unavoidable tool to perform our common tasks.Accessing t...
Pervasive in nature and extensively used for a wide range of features, smartphone provides functiona...
There has been tremendous growth of mobile devices, which includes mobile phones, tablets etc. in re...
Mobile devices are increasingly used to store private and sensitive data, and this has led to an i...
The growing market of mobile devices forces to question about how to protect users’ credentials and ...
Nowadays, authentication is usually done by using username and password. They are common and can pr...
Bachelor’s thesis describes the basics of authentication methods by knowledge, used authentication t...
The use of mobile devices has extended to all areas of human life and has changed the way people wor...
Smartphones are the most popular and widespread personal devices. Apart from their conventional use,...
The growth in smartphone usage has led to increased user concerns regarding privacy and security. Sm...
User authentication is an essential task to contribute to efficient security of IT systems. Innovati...
In this thesis, we design three new authentication mechanisms based on user identity. Therefore, we ...
In this paper we propose a new biometric measure to authenticate the user of a smartphone: the movem...
The widespread usage of smartphones gives rise to new security and privacy concerns. Smartphones are...
Smartphones are context-aware devices that provide a compelling platform for ubiquitous computing an...