Mobile device sensorhistory as a second factor for authentication

Despite the availability of biometrics like face recognition and finger print scanners passwords are still a common widely accepted way to secure personal computers and business workstations. This stands in contrast with security measures we can find for cloud services like Dropbox and Google that p...

Full description

Bibliographic Details
Main Author: Vaas, C
Format: Working paper
Language:English
Published: 2015
Subjects: