Mobile device sensorhistory as a second factor for authentication

Despite the availability of biometrics like face recognition and finger print scanners passwords are still a common widely accepted way to secure personal computers and business workstations. This stands in contrast with security measures we can find for cloud services like Dropbox and Google that p...

Descripción completa

Detalles Bibliográficos
Autor principal: Vaas, C
Formato: Working paper
Lenguaje:English
Publicado: 2015
Materias: