Login / Signup
A novel transparent user authentication approach for mobile applications.
Saud Alotaibi
Steven Furnell
Nathan L. Clarke
Published in:
Inf. Secur. J. A Glob. Perspect. (2018)
Keyphrases
</>
mobile applications
user authentication
authentication scheme
mobile devices
mobile phone
security analysis
context aware
user experience
biometric authentication
keystroke dynamics
information security
smart phones
biometric systems
authentication protocol
end users
remote user authentication scheme
wireless devices
user behavior