Implications of the Use of Emojis in Mobile Authentication.
Lydia KrausRobert SchmidtMarcel WalchFlorian SchaubChristopher KrügelsteinSebastian MöllerPublished in: WAY@SOUPS (2016)
Keyphrases
- mobile devices
- mobile phone
- mobile commerce
- mobile environments
- factor authentication
- identity authentication
- m learning
- context aware
- mobile learning
- mobile applications
- mobile computing
- identity management
- mobile services
- mobile networks
- smart phones
- neural network
- data sets
- authentication protocol
- mobile terminals
- computing environments
- authentication scheme
- mobile objects
- biometric authentication
- wireless networks
- low cost