2015
DOI: 10.1109/msp.2015.67
|View full text |Cite
|
Sign up to set email alerts
|

Biometric Authentication on Mobile Devices

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
15
0

Year Published

2017
2017
2021
2021

Publication Types

Select...
6
3

Relationship

0
9

Authors

Journals

citations
Cited by 28 publications
(15 citation statements)
references
References 4 publications
0
15
0
Order By: Relevance
“…With the increasing use of smartphones, users have begun to worry about the confidentiality of their data and information. As smartphones are intended for quick and recurrent access, it can lead to compromised privacy of smartphone data and information [ 3 ]. It has now become critical to maintain the privacy of sensitive data and information available through these devices using non-intrusive yet viable authentication mechanisms.…”
Section: Introductionmentioning
confidence: 99%
“…With the increasing use of smartphones, users have begun to worry about the confidentiality of their data and information. As smartphones are intended for quick and recurrent access, it can lead to compromised privacy of smartphone data and information [ 3 ]. It has now become critical to maintain the privacy of sensitive data and information available through these devices using non-intrusive yet viable authentication mechanisms.…”
Section: Introductionmentioning
confidence: 99%
“…Smartphones and mobile devices equipped with progressive sensors such as high-resolution cameras, digital compasses, gyroscopes, accelerometers, positioning systems provide a wide platform for researchers to enhance built in functions of these devices [8]. In [9] described smartphones as small, portable and powerful device that serve users with multiple task. With the development of mobile devices and the 3G mobile network, smartphones have assumed an important role in our life.…”
Section: Smartphonesmentioning
confidence: 99%
“…Identity based authentication has been considered for proving the ownership [55], [61].Digital signature, is a major identification technique [58] where the overhead of CA is there. But however biometric identification can be considered as the most unique method of identification [60], [64] and is more suitable than the conventional login id and password methods [68].…”
Section: Need For the Proposed Modelmentioning
confidence: 99%