Wi-Access: Second Factor User Authentication leveraging WiFi Signals.
Syed W. ShahSalil S. KanherePublished in: PerCom Workshops (2018)
Keyphrases
- user authentication
- wifi
- wireless networks
- wireless communication
- mobile devices
- end to end
- access control
- information security
- smart phones
- location information
- keystroke dynamics
- security analysis
- network architecture
- ad hoc networks
- mobile applications
- mobile networks
- authentication protocol
- response time
- smart home
- biometric systems
- anomaly detection
- digital libraries