[HTML][HTML] Authentication securing methods for mobile identity: Issues, solutions and challenges

ZA Zukarnain, A Muneer, MK Ab Aziz - Symmetry, 2022 - mdpi.com
Smartphone devices have become an essential part of our daily activities for performing
various essential applications containing very confidential information. For this reason, the …

[PDF][PDF] A critical insight into the identity authentication systems on smartphones

T Mehraj, MA Sheheryar, SA Lone… - Indonesian Journal of …, 2019 - academia.edu
The advancement of computing power on mobile devices and their popularity among people
in performing sensitive data exchange is uncovering an urgent need for a highly secure …

A secure multi factor user authentication framework for electronic payment system

MA Hassan, Z Shukur - 2021 3rd International Cyber …, 2021 - ieeexplore.ieee.org
In the growth of financial industries, the electronic payments system is a newest topic, which
is to be replaced in the near future by electronic or online transaction. With the advancement …

[PDF][PDF] Modern authentication techniques in smart phones: Security and usability perspective

U Shafique, H Khan, S Waqar, A Sher… - … International Journal of …, 2017 - academia.edu
A smartphone has more advanced computing ability and connectivity than basic featured
phones. Presently, we are moving from the Internet society to a mobile society where more …

Biometric and traditional mobile authentication techniques: Overviews and open issues

R Amin, T Gaber, G ElTaweel… - Bio-inspiring cyber security …, 2014 - Springer
Currently, mobile smartphone devices contain a critical and sensitive data. In addition, they
provide access to other data, on cloud for example, and to services somewhere on the …

User authentication on mobile devices: Approaches, threats and trends

C Wang, Y Wang, Y Chen, H Liu, J Liu - Computer Networks, 2020 - Elsevier
Mobile devices have brought a great convenience to us these years, which allow the users
to enjoy the anytime and anywhere various applications such as the online shopping …

A survey on user authentication factors

AAS AlQahtani, Z El-Awadi… - 2021 IEEE 12th Annual …, 2021 - ieeexplore.ieee.org
Today, digital information decisively permeates all aspects of modern society. In such a
connected world, one of the critical factors in maintaining the security of transmitted data is …

User behaviour-based mobile authentication system

ABA Ali, V Ponnusamy, A Sangodiah - Advances in Computer …, 2019 - Springer
Android is one of the most popular operating systems being used in smartphones and is
facing security issues. Many authentication techniques are being used, and most of them are …

[PDF][PDF] Smartphone-based biometric authentication scheme for access control management in client-server environment

SA Lone, AH Mir - Int J Inf Technol Comput Sci, 2022 - academia.edu
As the information put together by the blend of smartphones, the cloud, the IOT, and
ubiquitous computing continue to expand at an alarming rate, a data breach increases …

[PDF][PDF] Multi-factor authentication for e-government services using a smartphone application and biometric identity verification

M AlRousan, B Intrigila - Journal of Computer Science, 2020 - art.torvergata.it
The growing usage of smartphones and tablets has a significant impact on e-government
services, according to Cisco and accounted for 59 percent of total IP traffic during 2018. In …