Wi-Auth: WiFi based Second Factor User Authentication.
Syed W. ShahSalil S. KanherePublished in: MobiQuitous (2017)
Keyphrases
- user authentication
- wifi
- mobile devices
- wireless networks
- end to end
- wireless communication
- keystroke dynamics
- security analysis
- information security
- smart phones
- authentication protocol
- location information
- mobile applications
- network architecture
- smart card
- mobile networks
- smart home
- mobile phone
- routing problem
- urban environments
- real time
- response time
- information systems
- data mining