With the rapidly escalating use of smart devices and fraudulent transaction of users’ data from their devices, efficient and reliable techniques for authentication of the smart devices have become an obligatory issue. This paper reviews the security risks for mobile devices and studies several authentication techniques available for smart devices. The results from field studies enable a comparative evaluation of user-preferred authentication mechanisms and their opinions about reliability, biometric authentication and visual authentication techniques
Authentication protocols are very common mechanisms to confirm the legitimacy of someone’s or someth...
In modern days, gadgets are essential part of everyday lives and they enable to access a variety of ...
International audienceSmartphones have become ubiquitous in everyday life, storing and generating a ...
With the rapidly escalating use of smart devices and fraudulent transaction of users’ data from thei...
The file attached to this record is the author's final peer reviewed version. The Publisher's final ...
The growing market of mobile devices forces to question about how to protect users’ credentials and ...
Smartphones are the most popular and widespread personal devices. Apart from their conventional use,...
This study aims to examine the function and vulnerabilities of biometric systemsintegrated in smartp...
User authentication remains a challenging issue, despite the existence of a large number of proposed...
Mobile phones have become very complex devices through which we perform business functions and trans...
Over the past few years, the usage of mobile devices to access data has becoming more frequent, and ...
Biofeatures are fast becoming a key tool to authenticate the IoT devices; in this sense, the purpose...
Biometrics are biological measurements of an individual that can be used to identify them. This is c...
The effectiveness of primary and secondary authentication systems on mobile devices leaves room for ...
Pervasive in nature and extensively used for a wide range of features, smartphone provides functiona...
Authentication protocols are very common mechanisms to confirm the legitimacy of someone’s or someth...
In modern days, gadgets are essential part of everyday lives and they enable to access a variety of ...
International audienceSmartphones have become ubiquitous in everyday life, storing and generating a ...
With the rapidly escalating use of smart devices and fraudulent transaction of users’ data from thei...
The file attached to this record is the author's final peer reviewed version. The Publisher's final ...
The growing market of mobile devices forces to question about how to protect users’ credentials and ...
Smartphones are the most popular and widespread personal devices. Apart from their conventional use,...
This study aims to examine the function and vulnerabilities of biometric systemsintegrated in smartp...
User authentication remains a challenging issue, despite the existence of a large number of proposed...
Mobile phones have become very complex devices through which we perform business functions and trans...
Over the past few years, the usage of mobile devices to access data has becoming more frequent, and ...
Biofeatures are fast becoming a key tool to authenticate the IoT devices; in this sense, the purpose...
Biometrics are biological measurements of an individual that can be used to identify them. This is c...
The effectiveness of primary and secondary authentication systems on mobile devices leaves room for ...
Pervasive in nature and extensively used for a wide range of features, smartphone provides functiona...
Authentication protocols are very common mechanisms to confirm the legitimacy of someone’s or someth...
In modern days, gadgets are essential part of everyday lives and they enable to access a variety of ...
International audienceSmartphones have become ubiquitous in everyday life, storing and generating a ...