Spyware Resistant Smartphone User Authentication Scheme
As smart phones are becoming widely used, a variety of services to store and use important information such as photos and financial information are now provided. User authentication to protect this information is increasingly important. The commonly used 4-digit PIN, however, is vulnerable to the Br...
Saved in:
| Main Authors: | Taejin Kim, Jeong Hyun Yi, Changho Seo |
|---|---|
| Format: | Article |
| Language: | English |
| Published: |
Wiley
2014-03-01
|
| Series: | International Journal of Distributed Sensor Networks |
| Online Access: | https://doi.org/10.1155/2014/237125 |
| Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
Similar Items
-
User Authentication in Smartphones for Telehealth
by: Katherine A. Smith, et al.
Published: (2017-11-01) -
Hybrid Deep Learning Framework for Continuous User Authentication Based on Smartphone Sensors
by: Bandar Alotaibi, et al.
Published: (2025-04-01) -
An Improved Biometric-Based User Authentication Scheme for C/S System
by: Li Jiping, et al.
Published: (2014-04-01) -
A Security-Performance-Balanced User Authentication Scheme for Wireless Sensor Networks
by: Sang Guun Yoo, et al.
Published: (2012-03-01) -
An Improved Dynamic ID-Based Remote User Authentication with Key Agreement Scheme
by: Juan Qu, et al.
Published: (2013-01-01)