Modern Authentication Techniques in Smart Phones: Security and Usability Perspective

Welcome to DSpace BU Repository

Welcome to the Bahria University DSpace digital repository. DSpace is a digital service that collects, preserves, and distributes digital material. Repositories are important tools for preserving an organization's legacy; they facilitate digital preservation and scholarly communication.

Show simple item record

dc.contributor.author Usman Shafique
dc.contributor.author Asma Sher
dc.contributor.author Rahim Ullah
dc.contributor.author Hikmat Khan
dc.contributor.author Adnan Zeb
dc.contributor.author Rehmat Ullah
dc.contributor.author Sabah-ud-din Waqar
dc.contributor.author Uferah Shafi
dc.contributor.author Faisal Bashir
dc.contributor.author Munam Ali Shah
dc.date.accessioned 2018-09-25T12:03:19Z
dc.date.available 2018-09-25T12:03:19Z
dc.date.issued 2017
dc.identifier.uri http://hdl.handle.net/123456789/7490
dc.description.abstract A smartphone has more advanced computing ability and connectivity than basic featured phones. Presently, we are moving from the Internet society to a mobile society where more and more access to the information is required. This has resulted in a mobile security which is no longer immanent, but imperative. Smartphone authentication has received substantial attention of the research community for the past several years because there have been modern developments beyond the classical PINs and passwords making user authentication more challenging. In this paper, we critically analyze the attacks and the vulnerabilities in smartphones’ authentication mechanisms. A comparative analysis of different authentication techniques along with the usage of the different authentication methods is discussed which lead the end-user towards choosing the most suitable and customizable authentication technique. en_US
dc.language.iso en en_US
dc.publisher Bahria University Islamabad Campus en_US
dc.subject Department of Computer Science CS en_US
dc.title Modern Authentication Techniques in Smart Phones: Security and Usability Perspective en_US
dc.type Article en_US


Files in this item

This item appears in the following Collection(s)

Show simple item record

Search DSpace


Advanced Search

Browse

My Account