Research of Authentication Methods in Mobile Applications

Б Олійник, ЮМ Щебланін… - … Volume 3421, 2023 …, 2023 - elibrary.kubg.edu.ua
Today, most web applications use authentication methods that often rely on social media
authentication or simple registration by entering a unique ID and password. When it comes …

[HTML][HTML] A survey of android mobile phone authentication schemes

D Kunda, M Chishimba - Mobile Networks and Applications, 2021 - Springer
The Android operating system is the most popular mobile operating system resulting in a
great number of applications being developed for the platform. This makes them vulnerable …

[PDF][PDF] Authorization and Authentication in Mobile Devices

V Kumar - academia.edu
With the rapid evolution of the wireless communication technology, user authorization and
authentication is important in order to ensure the security of the wireless communication …

CREDENTIAL ANALYSIS FOR SECURITY CONFIGURATION ON CUSTOM ANDROID ROM

JT Santoso, FD Silalahi, LR Haidar - Journal of Technology …, 2022 - jtie.stekom.ac.id
Android is an operating system with open source and consists of several layers, with the
different layers its duties and responsibilities. Various parties in the customization chain …

[HTML][HTML] Application Authentication via Various Distributors

KS Han, TS Shon - The KIPS Transactions: PartC, 2012 - koreascience.kr
Google Android provides market based application distribution to provide ease use of
application services. While openness of Android allows various ways of application …

[PDF][PDF] Android applications security

P Pocatilu - Informatica Economica, 2011 - revistaie.ase.ro
The use of smartphones worldwide is growing very fast and also the malicious attacks have
increased. The mobile security applications development keeps the pace with this trend. The …

Android authentication and device administration API

R Agarwal, S Bilokhatniuk - Journal of Computing Sciences in Colleges, 2012 - dl.acm.org
This paper examines security capabilities of Android open source operating system based
on GNU/Linux and components developed by Google. The focus of this paper is analysis of …

Cryptographic Analysis: Popular Social Media Applications and Mitigations of Vulnerabilities

IT Moon, A Mimi, MMR Mridha - 2023 26th International …, 2023 - ieeexplore.ieee.org
In this paper, we have conducted a cryptographic analysis of the most widely used Android
social media applications. In Android social media applications, cryptography plays a vital …

[PDF][PDF] Design issues in the construction of a cryptographically secure instant message service for android smartphones

A Braga, D Schwab - … on Emerging Security Information, Systems and …, 2014 - academia.edu
This paper describes design and implementation issues concerning the construction of a
cryptographically secure instant message service for Android devices along with its …

[引用][C] Comparative Study of Security Measures in Android and iOS

AS Sreerama, BM Sagar - 2020