Mobile device sensorhistory as a second factor for authentication

Despite the availability of biometrics like face recognition and finger print scanners passwords are still a common widely accepted way to secure personal computers and business workstations. This stands in contrast with security measures we can find for cloud services like Dropbox and Google that p...

Disgrifiad llawn

Manylion Llyfryddiaeth
Prif Awdur: Vaas, C
Fformat: Working paper
Iaith:English
Cyhoeddwyd: 2015
Pynciau: