A Novel and Efficient Mobile Device Authentication Architecture
Abstract
Keywords
Full Text:
PDFReferences
Mohammad Shirali-Shahreza, Sajad Shirali-Shahreza.”Passwordless Login System for Mobile Phones Using CAPTCHA” 49th International Symposium ELMAR-2007, 12-14 September 2007, Zadar, Croatia.
X.Ke, R.Manuel, M. Wilkerson, and L.Jin. “Keystroke Dyamics: A Web-based Biometric solution.” 13th USENIX Security Symposium.
R. Joyce and G. Gupta. “Identity Authentication Based on Keystroke Latencies.”ACM, Vol. 33, No. 2, p168-176, 1990.
F.Bergadano, D. Gunetti, and C. Picardi. ”User Authentication through Keystroke Dynamics.” ACM. Transactions on Information and System Security, Vol. 5, No. 4, Nov., p. 367-397, 2002.
B.Schneier,”The Use & Abuses of Biometrics”, ACM, 42(8) pp 136, 1999.
Chen GD, Chang CK, Wang CY. “Ubiquitous learning website: Scaffold learners by mobile devices with information-aware techniques,” Computers & Education, 50(1), 77–90, 2008.
Clarke N, Furnell S., “Authentication of users on mobile telephones a survey of attitudes and practices,” Computers & Security, 24(7), 519–27, 2005.
Clarke N, Furnell S, “Advanced user authentication for mobile Devices,” Computers & Security 26(2), 109–19, 2007.
Clarke N, Furnell S, “Authenticating mobile phone users using keystroke analysis,” International Journal of Information Security, 6(1), 1–14, 2007.
Umphress D, Williams G, “Identity verification through keyboard characteristics,” International Journal of Man Machine Studies, 23,263–73, 1985.
Refbacks
- There are currently no refbacks.
This work is licensed under a Creative Commons Attribution 3.0 License.