Conceivable security risks and authentication techniques for smart devices
Name:
s zhang Conceivable Security ...
Size:
583.6Kb
Format:
PDF
Description:
author's version
Affiliation
COMSATS Institute of Information Technology, PakistanUniversity of Bedfordshire
Bath Spa University
Issue Date
2016-06-29
Metadata
Show full item recordAbstract
With the rapidly escalating use of smart devices and fraudulent transaction of users’ data from their devices, efficient and reliable techniques for authentication of the smart devices have become an obligatory issue. This paper reviews the security risks for mobile devices and studies several authentication techniques available for smart devices. The results from field studies enable a comparative evaluation of user-preferred authentication mechanisms and their opinions about reliability, biometric authentication and visual authentication techniques.Citation
Muzammal SM, Shah MA, Zhang S, Yang H (2016) 'Conceivable security risks and authentication techniques for smart devices', International Journal of Automation and Computing, 13 (4), pp.350-363.Publisher
SpringerAdditional Links
http://link.springer.com/article/10.1007/s11633-016-1011-5Type
ArticleLanguage
enISSN
1476-8186ae974a485f413a2113503eed53cd6c53
10.1007/s11633-016-1011-5
Scopus Count
Collections
The following license files are associated with this item:
- Creative Commons
Except where otherwise noted, this item's license is described as Green - can archive pre-print and post-print or publisher's version/PDF