Muzammal, S.M, Shah, M.A, Zhang, S-J and Yang, H (2016) 'Conceivable security risks and authentication techniques for smart devices: a comparative evaluation of security practices.' International Journal of Automation and Computing, 13 (4). pp. 350-363. ISSN 1476-8186
With the rapidly escalating use of smart devices and fraudulent transaction of users’ data from their devices, efficient and reliable techniques for authentication of the smart devices have become an obligatory issue. This paper reviews the security risks for mobile devices and studies several authentication techniques available for smart devices. The results from field studies enable a comparative evaluation of user-preferred authentication mechanisms and their opinions about reliability, biometric authentication and visual authentication techniques.
|Keywords:||Smart devices; security risks; authentication; biometric; privacy|
|Divisions:||College of Liberal Arts|
|Date Deposited:||05 Mar 2017 18:08|
|Last Modified:||05 Mar 2017 18:11|
|Request a change to this item or report an issue|
|Update item (repository staff only)|