An empirical study examining the perceptions and behaviours of security-conscious users of mobile authentication.
Flynn WolfRavi KuberAdam J. AvivPublished in: Behav. Inf. Technol. (2018)
Keyphrases
- factor authentication
- mobile computing environment
- mobile internet
- mobile applications
- identity authentication
- security mechanisms
- security requirements
- mobile devices
- mobile commerce
- security services
- mobile computing
- mobile terminals
- data encryption
- smart phones
- security analysis
- end users
- mobile services
- user authentication
- mobile phone
- content providers
- user centric
- authentication mechanism
- trust relationships
- information security
- encryption decryption
- authentication scheme
- authentication protocol
- key agreement protocol
- value added services
- key agreement
- fuzzy vault
- identity management
- internet services
- personal data
- access control
- intrusion detection
- network security
- biometric data
- user profiles
- user experience
- mobile learning
- graphical password
- user interface
- integrity verification
- computing environments
- trusted third party
- mobile users
- security policies
- key distribution