Modern Authentication Techniques in Smart Phones: Security and Usability Perspective
Journal Title: International Journal of Advanced Computer Science & Applications - Year 2017, Vol 8, Issue 1
Abstract
A smartphone has more advanced computing ability and connectivity than basic featured phones. Presently, we are moving from the Internet society to a mobile society where more and more access to the information is required. This has resulted in a mobile security which is no longer immanent, but imperative. Smartphone authentication has received substantial attention of the research community for the past several years because there have been modern developments beyond the classical PINs and passwords making user authentication more challenging. In this paper, we critically analyze the attacks and the vulnerabilities in smartphones’ authentication mechanisms. A comparative analysis of different authentication techniques along with the usage of the different authentication methods is discussed which lead the end-user towards choosing the most suitable and customizable authentication technique.
Authors and Affiliations
Usman Shafique, Hikmat Khan, Sabah-ud-din Waqar, Asma Sher, Adnan Zeb, Uferah Shafi, Rahim Ullah, Rehmat Ullah, Faisal Bashir, Munam Ali Shah
Energy-Aware Virtual Network Embedding Approach for Distributed Cloud
Network virtualization has caught the attention of many researchers in recent years. It facilitates the process of creating several virtual networks over a single physical network. Despite this advantage, however, networ...
A Novel Ball on Beam Stabilizing Platform with Inertial Sensors
This research paper presents dynamic modeling of inertial sensor based one degree of freedom (1-DoF) stabilizing platform. Plant is a ball on a pivoted beam. Nonlinear modeling of the plant is done. Ball position on beam...
Efficient K-Nearest Neighbor Searches for Multiple-Face Recognition in the Classroom based on Three Levels DWT-PCA
The main weakness of the k-Nearest Neighbor algorithm in face recognition is calculating the distance and sort all training data on each prediction which can be slow if there are a large number of training instances. Thi...
Dynamic Modification of Activation Function using the Backpropagation Algorithm in the Artificial Neural Networks
The paper proposes the dynamic modification of the activation function in a learning technique, more exactly backpropagation algorithm. The modification consists in changing slope of sigmoid function for activation funct...
Content Based Image Retrieval Using Gray Scale Weighted Average Method
High feature vector dimension quietly remained a curse element for Content Based Image Retrieval (CBIR) system which eventually degrades its efficiency while indexing similar images from database. This paper proposes CBI...