Rhythm-based authentication scheme on smart devices

0Citations
Citations of this article
2Readers
Mendeley users who have this article in their library.
Get full text

Abstract

Due to computing power and advances of smart devices, recently uses of smart-phone have been rapidly increasing. Smart devices (smartphones and tablet PC etc.) threats such as a personal information leakage and fraudulent use of smart devices have also increased. So, effective measures are needed to address security issues of smart devices—authentication, access control, prevention from the attackers. In this paper, we proposed a rhythm-based user authentication scheme on smart devices. The proposed scheme complements the vulnerabilities of the existing schemes, and provides authentication that ensures availability. In additional, it provides stronger security and greater convenience.

Cite

CITATION STYLE

APA

Lee, J. D., Kang, W. M., Moon, C. H., Jeong, H. Y., Jeong, Y. S., Jung, J. J., & Park, J. H. (2014). Rhythm-based authentication scheme on smart devices. In Lecture Notes in Electrical Engineering (Vol. 301, pp. 313–319). Springer Verlag. https://doi.org/10.1007/978-94-017-8798-7_38

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free