Fingerprint recognition with embedded cameras on mobile phones

MO Derawi, B Yang, C Busch - Security and Privacy in Mobile Information …, 2012 - Springer
Mobile phones with a camera function are capable of capturing image and processing tasks.
Fingerprint recognition has been used in many different applications where high security is …

Security taxonomy in iot–a survey

P Williams, P Rojas, M Bayoumi - 2019 IEEE 62nd International …, 2019 - ieeexplore.ieee.org
Internet of Things (IoT) devices have been identified as the primary source or compromised
node responsible for the recent increase in reported cases of network intrusion attacks …

Tolerance for typographical errors on password authentication securely via keystroke dynamics

M Koistinen - 2021 - aaltodoc.aalto.fi
Text-based passwords have a firmly established status as the standard means for user
authentication on computer systems, especially in online environments. Despite the high …

An investigation into the usability and acceptability of multi-channel authentication to online banking users in Oman

MAS Al-Fairuz - 2011 - theses.gla.ac.uk
Authentication mechanisms provide the cornerstone for security for many distributed
systems, especially for increasingly popular online applications. For decades, widely used …

Web based security with LOPass user authentication protocol in mobile application

AT Bhole, S Chaudhari - 2013 IEEE International Conference …, 2013 - ieeexplore.ieee.org
Today, the internet has became most convenient and widely used media for people
exchanging information and doing business over the internet such as accessing web based …