Towards device-to-user authentication: protecting against phishing hardware by ensuring mobile device authenticity using vibration patterns.
Rainhard Dieter FindlingRené MayrhoferPublished in: MUM (2015)
Keyphrases
- user authentication
- mobile handheld devices
- mobile devices
- desktop computers
- low cost
- security analysis
- authentication scheme
- handheld devices
- real time
- remote server
- biometric authentication
- keystroke dynamics
- remote user authentication scheme
- authentication protocol
- biometric systems
- image processing
- data mining
- small screen
- information security
- information systems