Login / Signup
Using Mobile Devices for Secondary User Authentication.
Chung-Han Chen
Min-Hsao Chen
Published in:
ICWN (2010)
Keyphrases
</>
user authentication
mobile devices
authentication scheme
security analysis
keystroke dynamics
biometric authentication
authentication protocol
information security
biometric systems
remote user authentication scheme
image compression
anomaly detection