n-Auth: Mobile Authentication Done Right.
Roel PeetersJens HermansPieter MaeneKatri GrenmanKimmo HalunenJuha HäikiöPublished in: ACSAC (2017)
Keyphrases
- mobile devices
- mobile phone
- factor authentication
- biometric authentication
- mobile learning
- mobile commerce
- m learning
- mobile networks
- mobile technologies
- mobile applications
- authentication protocol
- multimedia
- authentication scheme
- context aware
- identity authentication
- fragile watermarking
- wearable devices
- authentication mechanism
- location aware
- security mechanisms
- mobile environments
- computing environments