Modern Authentication Schemes in Smartphones and IoT Devices: An Empirical Survey.
Milad Taleby AhvanooeyMark Xuefang ZhuQianmu LiWojciech MazurczykKim-Kwang Raymond ChooBrij Bhooshan GuptaMauro ContiPublished in: IEEE Internet Things J. (2022)
Keyphrases
- mobile devices
- mobile applications
- smart phones
- management system
- desktop computers
- tablet computers
- mobile computing
- context aware
- smart objects
- smart devices
- mobile phone
- mobile learning
- cloud computing
- biometric authentication
- key agreement
- graphical password
- digital images
- image authentication
- embedded devices
- user authentication
- survey data
- security mechanisms
- data collection
- ubiquitous computing
- embedded systems