2021
DOI: 10.1007/978-3-030-93747-8_1
|View full text |Cite
|
Sign up to set email alerts
|

WYK: Mobile Device Authentication Using the User’s Address Book

Abstract: Authenticating a user the correct way is paramount to IT systems, where the risk is growing more and more in number and complexity. This is specially important in mobile phones, where a number of applications require continuous device authentication following the Point-of-Entry user authentication. Existing common approach in systems that require strict security rules and regulations is to use a One-Time-Password (OTP). Usually the OTP is generated using a special hardware device or another application that is… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...

Citation Types

0
0
0

Publication Types

Select...

Relationship

0
0

Authors

Journals

citations
Cited by 0 publications
references
References 27 publications
0
0
0
Order By: Relevance

No citations

Set email alert for when this publication receives citations?