On the Use of Emojis in Mobile Authentication.
Lydia KrausRobert SchmidtMarcel WalchFlorian SchaubSebastian MöllerPublished in: SEC (2017)
Keyphrases
- factor authentication
- mobile devices
- mobile phone
- context aware
- mobile computing
- mobile commerce
- identity authentication
- handheld devices
- autonomous mobile
- user authentication
- mobile communication
- security analysis
- mobile applications
- authentication protocol
- security mechanisms
- mobile environments
- mobile networks
- biometric authentication
- identity management
- value added services
- mobile learning
- multimedia