2012
DOI: 10.1007/978-3-642-30436-1_27
|View full text |Cite
|
Sign up to set email alerts
|

Balancing Security and Usability of Local Security Mechanisms for Mobile Devices

Abstract: Abstract. The loss of control over a new-generation mobile device (e.g. loss of device or short time of inattention) can have negative impacts on the owner's privacy due to the increasing number of privacy-sensitive data stored on such devices. Current mobile platforms either lack the required protection mechanisms or the implementations lack a balance between the level of security and usability. In order to fill this gap, we propose a design for a local security mechanism for mobile devices by using an reason… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1

Citation Types

0
3
0

Year Published

2013
2013
2021
2021

Publication Types

Select...
5
1

Relationship

0
6

Authors

Journals

citations
Cited by 6 publications
(3 citation statements)
references
References 12 publications
0
3
0
Order By: Relevance
“…Each confidentiality mechanism may impede or even be mutually exclusive with some functionality; such trade-offs are indeed common [66]. Following [15], we extend our analysis to include usability (for users) and adoptability (for providers).…”
Section: Criteria For Evaluationmentioning
confidence: 99%
“…Each confidentiality mechanism may impede or even be mutually exclusive with some functionality; such trade-offs are indeed common [66]. Following [15], we extend our analysis to include usability (for users) and adoptability (for providers).…”
Section: Criteria For Evaluationmentioning
confidence: 99%
“…Furthermore, it is difficult to confirm that the demand authentication data is from the rightful owner with just matching the letters of the password [20]. Password is a single factor authentication technique if used alone and can be merged with other techniques to perform multi-factor authentication techniques as will be declared next.…”
Section: Knowledge-based Authentication Techniquesmentioning
confidence: 99%
“…PIN is adopted as the only security mechanism for mobile devices. It is obvious that, PIN (something the user knows) is not very secure mechanism for authenticating users because of its limitation, as well as it is difficult to confirm that the demand is from the rightful owner [17,44].…”
Section: Introductionmentioning
confidence: 99%