Architectures to Implement In-Air Signature Mobile Authentication to Increase the Security of E-Commerce Applications and Opinion of End Users.
Javier Guerra CasanovaCarmen Sánchez ÁvilaVicente Jara VeraAlberto de Santos SierraGonzalo BailadorPublished in: DEIS (2011)
Keyphrases
- end users
- user friendliness
- factor authentication
- security mechanisms
- security requirements
- private key
- mobile applications
- authentication mechanism
- integrity verification
- user authentication
- data encryption
- fuzzy vault
- security analysis
- mobile commerce
- authentication protocol
- user requirements
- signature verification
- user interface
- application development
- biometric data
- digital signature
- user experience
- web applications
- mobile devices
- security issues
- public key
- authentication systems
- information security
- smart card
- authentication scheme
- user driven
- ubiquitous computing environments
- security protocols
- business intelligence
- virtual private network
- biometric authentication
- electronic commerce
- artificial intelligence
- search tools
- public key cryptography
- security policies
- network security
- context aware
- access control
- data analysis
- data mining