Login / Signup
Understanding environmental influences on performing password-based mobile authentication.
Sergey Maydebura
Dong Hyun Jeong
Byunggu Yu
Published in:
IRI (2013)
Keyphrases
</>
user authentication
security analysis
authentication protocol
mobile devices
mobile phone
key exchange
digital images
mobile learning
mobile applications
mobile users
mobile computing
mobile technologies
smart phones
factor authentication