D Korać, D Simić - Computers & Security, 2019 - Elsevier
… the MFA in a mobileenvironment. Accordingly, this paper is developed on three fundamental principles: a review and a description of contemporary mobileauthentication methods, their …
JK Mohsin, L Han, M Hammoudeh… - Proceedings of the …, 2017 - dl.acm.org
Mobile devices offer a convenient way of accessing our digital lives and many of those devices hold sensitive data that needs protecting. Mobile and wireless communications networks, …
… multifactorauthentication protocol in a mobileenvironment and can be implemented in the next stage of authentication. Alternatively, the proposed protocol can be used as an …
F Aloul, S Zahidi, W El-Hajj - International Journal of Mathematics …, 2009 - researchgate.net
This paper describes a method of implementing two factor authentication using mobile phones. The proposed method guarantees that authenticating to services, such as online banking …
E Huseynov, JM Seigneur - Computer and Information Security Handbook, 2017 - Elsevier
… Classic Approach to MultifactorAuthenticationMultifactorauthentication using carried devices (a hardware token or an application on a mobile device) as a context was among the first …
A Yohan, NW Lo, HR Lie - … on Personal, Indoor, and Mobile …, 2016 - ieeexplore.ieee.org
… The proposed multi-factorauthentication method is able to dynamically adjust its complexity … smartphone’s environment. By detecting signals from the user’s environment, our proposed …
AK Nag, A Roy, D Dasgupta - 2015 IEEE symposium series on …, 2015 - ieeexplore.ieee.org
… the existing environmental conditions within the selection of … Mobile devices are widely used to maintain online activities … continuous authentication to the users’ of mobile devices. …
… It was concluded that the ease of technology utilization and its environmental context play a … In summary, biometric technology is a prominent direction driven by the mobile device market…
D Prabakaran, S Ramachandran - CMC-Computers, Materials & …, 2022 - cdn.techscience.cn
… This proposed protocol is applicable for mobile devices and employs International Mobile Subscriber Identity (IMSI) number to provide an individual’s unique identification. Xie et al. [11] …