Continuous user authentication in mobile device and IoT environment
The conventional authentication methods, such as password authentication, fingerprint recognition and face recognition, have many drawbacks and disadvantages. The conventional authentication methods are snapshot and one-time authentication with a very high risk of being hacked. In the early days, th...
Main Author: | Liu, Allen Yang |
---|---|
Other Authors: | Ng Wee Keong |
Format: | Thesis-Master by Research |
Language: | English |
Published: |
Nanyang Technological University
2020
|
Subjects: | |
Online Access: | https://hdl.handle.net/10356/143089 |
Similar Items
-
IoT : development of a home automation system
by: Ku , Edwin Jun Hao
Published: (2022) -
Practical cold boot attack on IoT device - Case study on Raspberry Pi -
by: Won, Yoo-Seung, et al.
Published: (2021) -
Mobile application for IoT devices
by: Low, Delwyn Jia Wei
Published: (2023) -
An analysis of the AAḃ asymmetric encryption scheme on embedded devices for IoT environment / Syed Farid Syed Adnan
by: Syed Adnan, Syed Farid
Published: (2019) -
Integrating a web service and an iOS application through cloud computing
by: Sidhant Jain.
Published: (2012)