LocBiometrics: Mobile phone based multifactor biometric authentication with time and location assurance

I Lami, T Kuseler, H Al-Assam, SA Jassim - 2010 - bear.buckingham.ac.uk
The continuing growth of Smartphones and Superphones has significantly increased
mCommerce. The security of personal information on the phone and lack of the face-to-face …

Privacy preserving, real-time and location secured biometrics for mCommerce authentication

T Kuseler, H Al-Assam, S Jassim… - … , and Applications 2011, 2011 - spiedigitallibrary.org
Secure wireless connectivity between mobile devices and financial/commercial
establishments is mature, and so is the security of remote authentication for mCommerce …

[PDF][PDF] Fingerprint and location based multifactor authentication for mobile applications

NA Aldumiji, EA Khan - International Journal of Engineering and …, 2019 - researchgate.net
Authentication, which involves the verification of identity, is one of the most important
security features. It usually depends on three factors: something you know (knowledge) …

Biometrics on mobile phone

S Wang, J Liu - Recent Application in Biometrics, 2011 - books.google.com
In an era of information technology, mobile phones are more and more widely used
worldwide, not only for basic communications, but also as a tool to deal with personal affairs …

Identity verification using location over time information

DA Kuhlman, YQ Li, LC Puhl - US Patent 8,364,120, 2013 - Google Patents
BACKGROUND In many forms of electronic transactions, it is necessary for a device to verify
a user's identity. While humans are extremely good at identifying other humans through …

Biometric options for mobile phone authentication

MO Derawi - Biometric Technology Today, 2011 - Elsevier
Businesses and consumers are making increasing use of mobile phones to access
corporate data and networks, along with products and services that may demand …

Towards coupling user and device locations using biometrical authentication on smartphones

M Trojahn, P Marcus - 2012 international conference for …, 2012 - ieeexplore.ieee.org
The mobile access to resources via smartphones has caused the development of location-
based access control (LBAC) policies: A permission is granted, if a user is within an …

Picking the right path to mobile biometric authentication

T Thiemann - Biometric Technology Today, 2016 - Elsevier
Many online and mobile apps are used to manage highly valuable data, such as financial
transactions, personally identifiable information (PII) or intellectual property. It is vital …

Biometric and traditional mobile authentication techniques: Overviews and open issues

R Amin, T Gaber, G ElTaweel… - Bio-inspiring cyber security …, 2014 - Springer
Currently, mobile smartphone devices contain a critical and sensitive data. In addition, they
provide access to other data, on cloud for example, and to services somewhere on the …

Biometric authentication on mobile devices

LM Mayron - IEEE Security & Privacy, 2015 - computer.org
Biometric Authentication on Mobile Devices Toggle navigation IEEE Computer Society Digital
Library Jobs Tech News Resource Center Press Room Advertising About Us IEEE IEEE …