Advanced search options

Advanced Search Options 🞨

Browse by author name (“Author name starts with…”).

Find ETDs with:

in
/  
in
/  
in
/  
in

Written in Published in Earliest date Latest date

Sorted by

Results per page:

Sorted by: relevance · author · university · dateNew search

You searched for subject:(mobile authentication). Showing records 1 – 30 of 56 total matches.

[1] [2]

Search Limiters

Last 2 Years | English Only

Country

▼ Search Limiters


University of Plymouth

1. Saevanee, Hataichanok. Continuous user authentication using multi-modal biometrics.

Degree: PhD, 2014, University of Plymouth

 It is commonly acknowledged that mobile devices now form an integral part of an individual’s everyday life. The modern mobile handheld devices are capable to… (more)

Subjects/Keywords: 005.8; Biometrics; Authentication; Mobile Devices

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Saevanee, H. (2014). Continuous user authentication using multi-modal biometrics. (Doctoral Dissertation). University of Plymouth. Retrieved from http://hdl.handle.net/10026.1/3033

Chicago Manual of Style (16th Edition):

Saevanee, Hataichanok. “Continuous user authentication using multi-modal biometrics.” 2014. Doctoral Dissertation, University of Plymouth. Accessed October 14, 2019. http://hdl.handle.net/10026.1/3033.

MLA Handbook (7th Edition):

Saevanee, Hataichanok. “Continuous user authentication using multi-modal biometrics.” 2014. Web. 14 Oct 2019.

Vancouver:

Saevanee H. Continuous user authentication using multi-modal biometrics. [Internet] [Doctoral dissertation]. University of Plymouth; 2014. [cited 2019 Oct 14]. Available from: http://hdl.handle.net/10026.1/3033.

Council of Science Editors:

Saevanee H. Continuous user authentication using multi-modal biometrics. [Doctoral Dissertation]. University of Plymouth; 2014. Available from: http://hdl.handle.net/10026.1/3033


University of Plymouth

2. Hocking, Christopher George. Authentication aura : a cooperative and distributed approach to user authentication on mobile devices.

Degree: PhD, 2015, University of Plymouth

 As information technology pervades our lives we have increasingly come to rely on these evermore sophisticated and ubiquitous items of equipment. Portability and the desire… (more)

Subjects/Keywords: 005.25; user authentication; transparent; cooperative; mobile device security; authentication aura

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Hocking, C. G. (2015). Authentication aura : a cooperative and distributed approach to user authentication on mobile devices. (Doctoral Dissertation). University of Plymouth. Retrieved from http://hdl.handle.net/10026.1/3469

Chicago Manual of Style (16th Edition):

Hocking, Christopher George. “Authentication aura : a cooperative and distributed approach to user authentication on mobile devices.” 2015. Doctoral Dissertation, University of Plymouth. Accessed October 14, 2019. http://hdl.handle.net/10026.1/3469.

MLA Handbook (7th Edition):

Hocking, Christopher George. “Authentication aura : a cooperative and distributed approach to user authentication on mobile devices.” 2015. Web. 14 Oct 2019.

Vancouver:

Hocking CG. Authentication aura : a cooperative and distributed approach to user authentication on mobile devices. [Internet] [Doctoral dissertation]. University of Plymouth; 2015. [cited 2019 Oct 14]. Available from: http://hdl.handle.net/10026.1/3469.

Council of Science Editors:

Hocking CG. Authentication aura : a cooperative and distributed approach to user authentication on mobile devices. [Doctoral Dissertation]. University of Plymouth; 2015. Available from: http://hdl.handle.net/10026.1/3469


KTH

3. Mumtaz, Majid. Security Services for Mobile Applications.

Degree: Information and Communication Technology (ICT), 2012, KTH

  In today's era of technology, information can revolve the whole world within seconds via Internet. Devices such as smartphones, tablets and smart applications running… (more)

Subjects/Keywords: Mobile Applications Security; Authentication; microSD; Secure Element

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Mumtaz, M. (2012). Security Services for Mobile Applications. (Thesis). KTH. Retrieved from http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-116762

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Mumtaz, Majid. “Security Services for Mobile Applications.” 2012. Thesis, KTH. Accessed October 14, 2019. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-116762.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Mumtaz, Majid. “Security Services for Mobile Applications.” 2012. Web. 14 Oct 2019.

Vancouver:

Mumtaz M. Security Services for Mobile Applications. [Internet] [Thesis]. KTH; 2012. [cited 2019 Oct 14]. Available from: http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-116762.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Mumtaz M. Security Services for Mobile Applications. [Thesis]. KTH; 2012. Available from: http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-116762

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


Rochester Institute of Technology

4. Pinch, Michael. Improving security and usability of mobile device authentication mechanisms.

Degree: 2012, Rochester Institute of Technology

Mobile devices, in the form of smartphones and tablet computers, are going through an amazing growth cycle. The devices are powerful and robust enough… (more)

Subjects/Keywords: Authentication; Mobile; Security; Smartphone; Tablet; Touchscreen

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Pinch, M. (2012). Improving security and usability of mobile device authentication mechanisms. (Thesis). Rochester Institute of Technology. Retrieved from https://scholarworks.rit.edu/theses/4932

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Pinch, Michael. “Improving security and usability of mobile device authentication mechanisms.” 2012. Thesis, Rochester Institute of Technology. Accessed October 14, 2019. https://scholarworks.rit.edu/theses/4932.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Pinch, Michael. “Improving security and usability of mobile device authentication mechanisms.” 2012. Web. 14 Oct 2019.

Vancouver:

Pinch M. Improving security and usability of mobile device authentication mechanisms. [Internet] [Thesis]. Rochester Institute of Technology; 2012. [cited 2019 Oct 14]. Available from: https://scholarworks.rit.edu/theses/4932.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Pinch M. Improving security and usability of mobile device authentication mechanisms. [Thesis]. Rochester Institute of Technology; 2012. Available from: https://scholarworks.rit.edu/theses/4932

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


Rutgers University

5. Shah, Ankit, 1992-. Pianotap: improving tap authentication on mobile devices.

Degree: MS, Electrical and Computer Engineering, 2016, Rutgers University

 In this thesis, we study authentication on mobile devices by performing simple taps on the touchscreen. First, we have replicated a previously proposed system Pass-… (more)

Subjects/Keywords: Computer security; Authentication; Mobile computing – Security measures

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Shah, Ankit, 1. (2016). Pianotap: improving tap authentication on mobile devices. (Masters Thesis). Rutgers University. Retrieved from https://rucore.libraries.rutgers.edu/rutgers-lib/50179/

Chicago Manual of Style (16th Edition):

Shah, Ankit, 1992-. “Pianotap: improving tap authentication on mobile devices.” 2016. Masters Thesis, Rutgers University. Accessed October 14, 2019. https://rucore.libraries.rutgers.edu/rutgers-lib/50179/.

MLA Handbook (7th Edition):

Shah, Ankit, 1992-. “Pianotap: improving tap authentication on mobile devices.” 2016. Web. 14 Oct 2019.

Vancouver:

Shah, Ankit 1. Pianotap: improving tap authentication on mobile devices. [Internet] [Masters thesis]. Rutgers University; 2016. [cited 2019 Oct 14]. Available from: https://rucore.libraries.rutgers.edu/rutgers-lib/50179/.

Council of Science Editors:

Shah, Ankit 1. Pianotap: improving tap authentication on mobile devices. [Masters Thesis]. Rutgers University; 2016. Available from: https://rucore.libraries.rutgers.edu/rutgers-lib/50179/


University of Plymouth

6. Alotaibi, Saud Nejr S. Transparent user authentication for mobile applications.

Degree: PhD, 2019, University of Plymouth

 The use of smartphones in our daily lives has grown steadily, due to the combination of mobility and round-the-clock multi-connectivity. In particular, smartphones are used… (more)

Subjects/Keywords: Transparent authentication; mobile applications; mobile security; usable security biometric authentication; smartphones; tablets

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Alotaibi, S. N. S. (2019). Transparent user authentication for mobile applications. (Doctoral Dissertation). University of Plymouth. Retrieved from http://hdl.handle.net/10026.1/14107

Chicago Manual of Style (16th Edition):

Alotaibi, Saud Nejr S. “Transparent user authentication for mobile applications.” 2019. Doctoral Dissertation, University of Plymouth. Accessed October 14, 2019. http://hdl.handle.net/10026.1/14107.

MLA Handbook (7th Edition):

Alotaibi, Saud Nejr S. “Transparent user authentication for mobile applications.” 2019. Web. 14 Oct 2019.

Vancouver:

Alotaibi SNS. Transparent user authentication for mobile applications. [Internet] [Doctoral dissertation]. University of Plymouth; 2019. [cited 2019 Oct 14]. Available from: http://hdl.handle.net/10026.1/14107.

Council of Science Editors:

Alotaibi SNS. Transparent user authentication for mobile applications. [Doctoral Dissertation]. University of Plymouth; 2019. Available from: http://hdl.handle.net/10026.1/14107


KTH

7. Desta, Girmay. Security for Mobile Payment Transaction.

Degree: Information and Communication Technology (ICT), 2012, KTH

  The advancement of ICT in a variety of sectors helped in improving the time consuming and rigid service into fast and flexible service that… (more)

Subjects/Keywords: Strong Authentication; mobile security; PIV; mobile PKI; payment privacy; EMV security

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Desta, G. (2012). Security for Mobile Payment Transaction. (Thesis). KTH. Retrieved from http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-116690

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Desta, Girmay. “Security for Mobile Payment Transaction.” 2012. Thesis, KTH. Accessed October 14, 2019. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-116690.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Desta, Girmay. “Security for Mobile Payment Transaction.” 2012. Web. 14 Oct 2019.

Vancouver:

Desta G. Security for Mobile Payment Transaction. [Internet] [Thesis]. KTH; 2012. [cited 2019 Oct 14]. Available from: http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-116690.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Desta G. Security for Mobile Payment Transaction. [Thesis]. KTH; 2012. Available from: http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-116690

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


Cleveland State University

8. Gurary, Jonathan, Gurary. Improving the Security of Mobile Devices Through Multi-Dimensional and Analog Authentication.

Degree: Doctor of Engineering, Washkewicz College of Engineering, 2018, Cleveland State University

Mobile devices are ubiquitous in today's society, and the usage of these devices for secure tasks like corporate email, banking, and stock trading grows by… (more)

Subjects/Keywords: Computer Engineering; Computer Science; authentication; mobile authentication; graphical password; analog authentication; multi-dimensional authentication; shoulder-surfing; challenge-response; keystroke dynamics; virtual reality

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Gurary, Jonathan, G. (2018). Improving the Security of Mobile Devices Through Multi-Dimensional and Analog Authentication. (Doctoral Dissertation). Cleveland State University. Retrieved from http://rave.ohiolink.edu/etdc/view?acc_num=csu1521564381685222

Chicago Manual of Style (16th Edition):

Gurary, Jonathan, Gurary. “Improving the Security of Mobile Devices Through Multi-Dimensional and Analog Authentication.” 2018. Doctoral Dissertation, Cleveland State University. Accessed October 14, 2019. http://rave.ohiolink.edu/etdc/view?acc_num=csu1521564381685222.

MLA Handbook (7th Edition):

Gurary, Jonathan, Gurary. “Improving the Security of Mobile Devices Through Multi-Dimensional and Analog Authentication.” 2018. Web. 14 Oct 2019.

Vancouver:

Gurary, Jonathan G. Improving the Security of Mobile Devices Through Multi-Dimensional and Analog Authentication. [Internet] [Doctoral dissertation]. Cleveland State University; 2018. [cited 2019 Oct 14]. Available from: http://rave.ohiolink.edu/etdc/view?acc_num=csu1521564381685222.

Council of Science Editors:

Gurary, Jonathan G. Improving the Security of Mobile Devices Through Multi-Dimensional and Analog Authentication. [Doctoral Dissertation]. Cleveland State University; 2018. Available from: http://rave.ohiolink.edu/etdc/view?acc_num=csu1521564381685222


Dalhousie University

9. Allahem, Hisham. MUTUAL AUTHENTICATION SCHEME FOR MOBILE RFID SYSTEMS.

Degree: Master of Computer Science, Faculty of Computer Science, 2013, Dalhousie University

 Radio Frequency Identification (RFID) systems are rapidly becoming popular in a variety of applications such as supply chain management, storage management and healthcare. Such a… (more)

Subjects/Keywords: Mobile; Mutual Authentication; RFID; Security; Ultra-lightweight; Ultralightweight

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Allahem, H. (2013). MUTUAL AUTHENTICATION SCHEME FOR MOBILE RFID SYSTEMS. (Masters Thesis). Dalhousie University. Retrieved from http://hdl.handle.net/10222/21728

Chicago Manual of Style (16th Edition):

Allahem, Hisham. “MUTUAL AUTHENTICATION SCHEME FOR MOBILE RFID SYSTEMS.” 2013. Masters Thesis, Dalhousie University. Accessed October 14, 2019. http://hdl.handle.net/10222/21728.

MLA Handbook (7th Edition):

Allahem, Hisham. “MUTUAL AUTHENTICATION SCHEME FOR MOBILE RFID SYSTEMS.” 2013. Web. 14 Oct 2019.

Vancouver:

Allahem H. MUTUAL AUTHENTICATION SCHEME FOR MOBILE RFID SYSTEMS. [Internet] [Masters thesis]. Dalhousie University; 2013. [cited 2019 Oct 14]. Available from: http://hdl.handle.net/10222/21728.

Council of Science Editors:

Allahem H. MUTUAL AUTHENTICATION SCHEME FOR MOBILE RFID SYSTEMS. [Masters Thesis]. Dalhousie University; 2013. Available from: http://hdl.handle.net/10222/21728

10. Du, Tiantian. Examining young users’ security perceptions of mobile banking : A qualitative study on users’ insights about mobile banking.

Degree: Business Administration, 2017, Umeå University

  The advancement of mobile technology and banking services enabled users to use the mobile banking for a variety of tasks with their smartphones, bringing… (more)

Subjects/Keywords: Perceived security; Mobile banking; User awareness; Authentication; Business Administration; Företagsekonomi

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Du, T. (2017). Examining young users’ security perceptions of mobile banking : A qualitative study on users’ insights about mobile banking. (Thesis). Umeå University. Retrieved from http://urn.kb.se/resolve?urn=urn:nbn:se:umu:diva-141655

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Du, Tiantian. “Examining young users’ security perceptions of mobile banking : A qualitative study on users’ insights about mobile banking.” 2017. Thesis, Umeå University. Accessed October 14, 2019. http://urn.kb.se/resolve?urn=urn:nbn:se:umu:diva-141655.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Du, Tiantian. “Examining young users’ security perceptions of mobile banking : A qualitative study on users’ insights about mobile banking.” 2017. Web. 14 Oct 2019.

Vancouver:

Du T. Examining young users’ security perceptions of mobile banking : A qualitative study on users’ insights about mobile banking. [Internet] [Thesis]. Umeå University; 2017. [cited 2019 Oct 14]. Available from: http://urn.kb.se/resolve?urn=urn:nbn:se:umu:diva-141655.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Du T. Examining young users’ security perceptions of mobile banking : A qualitative study on users’ insights about mobile banking. [Thesis]. Umeå University; 2017. Available from: http://urn.kb.se/resolve?urn=urn:nbn:se:umu:diva-141655

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


NSYSU

11. Ho, Pei-hsiu. Provably Secure Nested One-Time Secret Mechanisms for Fast Mutual Authentication and Key Exchange in Mobile Communications.

Degree: PhD, Computer Science and Engineering, 2011, NSYSU

 Wireless communication has played a very important role in people communication activities due to the properties of fast mobility and high portability. Many security mechanisms… (more)

Subjects/Keywords: one-time secrets; mobile security; mutual authentication; key exchange; information security

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Ho, P. (2011). Provably Secure Nested One-Time Secret Mechanisms for Fast Mutual Authentication and Key Exchange in Mobile Communications. (Doctoral Dissertation). NSYSU. Retrieved from http://etd.lib.nsysu.edu.tw/ETD-db/ETD-search/view_etd?URN=etd-0210111-172909

Chicago Manual of Style (16th Edition):

Ho, Pei-hsiu. “Provably Secure Nested One-Time Secret Mechanisms for Fast Mutual Authentication and Key Exchange in Mobile Communications.” 2011. Doctoral Dissertation, NSYSU. Accessed October 14, 2019. http://etd.lib.nsysu.edu.tw/ETD-db/ETD-search/view_etd?URN=etd-0210111-172909.

MLA Handbook (7th Edition):

Ho, Pei-hsiu. “Provably Secure Nested One-Time Secret Mechanisms for Fast Mutual Authentication and Key Exchange in Mobile Communications.” 2011. Web. 14 Oct 2019.

Vancouver:

Ho P. Provably Secure Nested One-Time Secret Mechanisms for Fast Mutual Authentication and Key Exchange in Mobile Communications. [Internet] [Doctoral dissertation]. NSYSU; 2011. [cited 2019 Oct 14]. Available from: http://etd.lib.nsysu.edu.tw/ETD-db/ETD-search/view_etd?URN=etd-0210111-172909.

Council of Science Editors:

Ho P. Provably Secure Nested One-Time Secret Mechanisms for Fast Mutual Authentication and Key Exchange in Mobile Communications. [Doctoral Dissertation]. NSYSU; 2011. Available from: http://etd.lib.nsysu.edu.tw/ETD-db/ETD-search/view_etd?URN=etd-0210111-172909


NSYSU

12. Zhong, Min-Zhe. Fast Handover Authentication for Fifth Generation (5G) Mobile Communications.

Degree: Master, Computer Science and Engineering, 2014, NSYSU

 Due to the rising number of mobile devices and the increasing demand for better quality of service (QoS), issues related to the next generation of… (more)

Subjects/Keywords: handover; authentication; privacy preserving; active revocation; 5G mobile communications

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Zhong, M. (2014). Fast Handover Authentication for Fifth Generation (5G) Mobile Communications. (Thesis). NSYSU. Retrieved from http://etd.lib.nsysu.edu.tw/ETD-db/ETD-search/view_etd?URN=etd-0715114-180628

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Zhong, Min-Zhe. “Fast Handover Authentication for Fifth Generation (5G) Mobile Communications.” 2014. Thesis, NSYSU. Accessed October 14, 2019. http://etd.lib.nsysu.edu.tw/ETD-db/ETD-search/view_etd?URN=etd-0715114-180628.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Zhong, Min-Zhe. “Fast Handover Authentication for Fifth Generation (5G) Mobile Communications.” 2014. Web. 14 Oct 2019.

Vancouver:

Zhong M. Fast Handover Authentication for Fifth Generation (5G) Mobile Communications. [Internet] [Thesis]. NSYSU; 2014. [cited 2019 Oct 14]. Available from: http://etd.lib.nsysu.edu.tw/ETD-db/ETD-search/view_etd?URN=etd-0715114-180628.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Zhong M. Fast Handover Authentication for Fifth Generation (5G) Mobile Communications. [Thesis]. NSYSU; 2014. Available from: http://etd.lib.nsysu.edu.tw/ETD-db/ETD-search/view_etd?URN=etd-0715114-180628

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


University of Plymouth

13. Li, Fudong. Behaviour profiling for mobile devices.

Degree: PhD, 2012, University of Plymouth

 With more than 5 billion users globally, mobile devices have become ubiquitous in our daily life. The modern mobile handheld device is capable of providing… (more)

Subjects/Keywords: 004; behaviour profiling, mobile device, authentication, IDS, transparent

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Li, F. (2012). Behaviour profiling for mobile devices. (Doctoral Dissertation). University of Plymouth. Retrieved from http://hdl.handle.net/10026.1/1025

Chicago Manual of Style (16th Edition):

Li, Fudong. “Behaviour profiling for mobile devices.” 2012. Doctoral Dissertation, University of Plymouth. Accessed October 14, 2019. http://hdl.handle.net/10026.1/1025.

MLA Handbook (7th Edition):

Li, Fudong. “Behaviour profiling for mobile devices.” 2012. Web. 14 Oct 2019.

Vancouver:

Li F. Behaviour profiling for mobile devices. [Internet] [Doctoral dissertation]. University of Plymouth; 2012. [cited 2019 Oct 14]. Available from: http://hdl.handle.net/10026.1/1025.

Council of Science Editors:

Li F. Behaviour profiling for mobile devices. [Doctoral Dissertation]. University of Plymouth; 2012. Available from: http://hdl.handle.net/10026.1/1025


University of South Florida

14. Cetin, Cagri. Design, Testing and Implementation of a New Authentication Method Using Multiple Devices.

Degree: 2015, University of South Florida

Authentication protocols are very common mechanisms to confirm the legitimacy of someone’s or something’s identity in digital and physical systems. This thesis presents a new… (more)

Subjects/Keywords: access control; Authentication protocols; mobile devices; security; verification; Computer Sciences

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Cetin, C. (2015). Design, Testing and Implementation of a New Authentication Method Using Multiple Devices. (Thesis). University of South Florida. Retrieved from https://scholarcommons.usf.edu/etd/5660

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Cetin, Cagri. “Design, Testing and Implementation of a New Authentication Method Using Multiple Devices.” 2015. Thesis, University of South Florida. Accessed October 14, 2019. https://scholarcommons.usf.edu/etd/5660.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Cetin, Cagri. “Design, Testing and Implementation of a New Authentication Method Using Multiple Devices.” 2015. Web. 14 Oct 2019.

Vancouver:

Cetin C. Design, Testing and Implementation of a New Authentication Method Using Multiple Devices. [Internet] [Thesis]. University of South Florida; 2015. [cited 2019 Oct 14]. Available from: https://scholarcommons.usf.edu/etd/5660.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Cetin C. Design, Testing and Implementation of a New Authentication Method Using Multiple Devices. [Thesis]. University of South Florida; 2015. Available from: https://scholarcommons.usf.edu/etd/5660

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

15. Mandava, Karthik. Two Way Mobile Authentication System.

Degree: 2010, , School of Computing

The ever increasing use of internet around the world has without doubt increased the usage of internet based services, e-business models, easier ways of… (more)

Subjects/Keywords: Two factor authentication; One Time Password (OTP); Demo online Banking application; computer security; mobile device for authentication

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Mandava, K. (2010). Two Way Mobile Authentication System. (Thesis). , School of Computing. Retrieved from http://urn.kb.se/resolve?urn=urn:nbn:se:bth-4306

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Mandava, Karthik. “Two Way Mobile Authentication System.” 2010. Thesis, , School of Computing. Accessed October 14, 2019. http://urn.kb.se/resolve?urn=urn:nbn:se:bth-4306.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Mandava, Karthik. “Two Way Mobile Authentication System.” 2010. Web. 14 Oct 2019.

Vancouver:

Mandava K. Two Way Mobile Authentication System. [Internet] [Thesis]. , School of Computing; 2010. [cited 2019 Oct 14]. Available from: http://urn.kb.se/resolve?urn=urn:nbn:se:bth-4306.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Mandava K. Two Way Mobile Authentication System. [Thesis]. , School of Computing; 2010. Available from: http://urn.kb.se/resolve?urn=urn:nbn:se:bth-4306

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

16. Agarwal, Lalit. Evaluating Re-authentication Strategies for Smartphones.

Degree: 2016, University of Waterloo

 Re-authenticating users may be necessary for smartphone authentication schemes that leverage user behavior, device context, or task sensitivity. However, due to the unpredictable nature of… (more)

Subjects/Keywords: Mobile privacy; Android re-authentication; Smartphone authentication

authentication (IA): Mobile devices typically have many built-in sensors which are capable of… …authentication Techniques . . . . . . . . . . . . . . . 20 3.3.4 Context-Based Configurations… …authentication Techniques . . . . . . . . . . . . . . . . 46 Summary… …x List of Figures 2.1 Two recently proposed PIN-based authentication schemes… …9 2.2 Two recently proposed gesture-based authentication schemes. . . . . . . . . 11… 

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Agarwal, L. (2016). Evaluating Re-authentication Strategies for Smartphones. (Thesis). University of Waterloo. Retrieved from http://hdl.handle.net/10012/10611

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Agarwal, Lalit. “Evaluating Re-authentication Strategies for Smartphones.” 2016. Thesis, University of Waterloo. Accessed October 14, 2019. http://hdl.handle.net/10012/10611.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Agarwal, Lalit. “Evaluating Re-authentication Strategies for Smartphones.” 2016. Web. 14 Oct 2019.

Vancouver:

Agarwal L. Evaluating Re-authentication Strategies for Smartphones. [Internet] [Thesis]. University of Waterloo; 2016. [cited 2019 Oct 14]. Available from: http://hdl.handle.net/10012/10611.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Agarwal L. Evaluating Re-authentication Strategies for Smartphones. [Thesis]. University of Waterloo; 2016. Available from: http://hdl.handle.net/10012/10611

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


Anna University

17. Shanthini B. An enhanced security system Using multimodal biometrics For hierarchical mobile ad hoc Networks;.

Degree: An enhanced security system Using multimodal biometrics For hierarchical mobile ad hoc Networks, 2014, Anna University

The main objective of this research work is to design and develop a newlineCancelable Multimodal Biometric based Secured Authentication System newlineCMBSAS for hierarchically clustered Mobile(more)

Subjects/Keywords: Cancelable Multimodal Biometric based Secured Authentication System; Mobile Ad hoc Network; Wireless technologies

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

B, S. (2014). An enhanced security system Using multimodal biometrics For hierarchical mobile ad hoc Networks;. (Thesis). Anna University. Retrieved from http://shodhganga.inflibnet.ac.in/handle/10603/25708

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

B, Shanthini. “An enhanced security system Using multimodal biometrics For hierarchical mobile ad hoc Networks;.” 2014. Thesis, Anna University. Accessed October 14, 2019. http://shodhganga.inflibnet.ac.in/handle/10603/25708.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

B, Shanthini. “An enhanced security system Using multimodal biometrics For hierarchical mobile ad hoc Networks;.” 2014. Web. 14 Oct 2019.

Vancouver:

B S. An enhanced security system Using multimodal biometrics For hierarchical mobile ad hoc Networks;. [Internet] [Thesis]. Anna University; 2014. [cited 2019 Oct 14]. Available from: http://shodhganga.inflibnet.ac.in/handle/10603/25708.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

B S. An enhanced security system Using multimodal biometrics For hierarchical mobile ad hoc Networks;. [Thesis]. Anna University; 2014. Available from: http://shodhganga.inflibnet.ac.in/handle/10603/25708

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


NSYSU

18. Cheng, Yen-hung. One-Round Mutual Authentication Mechanism Based on Symmetric-Key Cryptosystems with Forward Secrecy and Location Privacy for Wireless Networks.

Degree: Master, Computer Science and Engineering, 2009, NSYSU

 In recent years, the development of mobile networks is thriving or flourishing from 2G GSM, 2.5G GPRS, 3G UMTS to All-IP 4G, which integrates all… (more)

Subjects/Keywords: Forward Secrecy; UMTS; False Base Attacks; Mobile Networks; Location Privacy; Mutual Authentication

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Cheng, Y. (2009). One-Round Mutual Authentication Mechanism Based on Symmetric-Key Cryptosystems with Forward Secrecy and Location Privacy for Wireless Networks. (Thesis). NSYSU. Retrieved from http://etd.lib.nsysu.edu.tw/ETD-db/ETD-search/view_etd?URN=etd-0812109-202320

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Cheng, Yen-hung. “One-Round Mutual Authentication Mechanism Based on Symmetric-Key Cryptosystems with Forward Secrecy and Location Privacy for Wireless Networks.” 2009. Thesis, NSYSU. Accessed October 14, 2019. http://etd.lib.nsysu.edu.tw/ETD-db/ETD-search/view_etd?URN=etd-0812109-202320.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Cheng, Yen-hung. “One-Round Mutual Authentication Mechanism Based on Symmetric-Key Cryptosystems with Forward Secrecy and Location Privacy for Wireless Networks.” 2009. Web. 14 Oct 2019.

Vancouver:

Cheng Y. One-Round Mutual Authentication Mechanism Based on Symmetric-Key Cryptosystems with Forward Secrecy and Location Privacy for Wireless Networks. [Internet] [Thesis]. NSYSU; 2009. [cited 2019 Oct 14]. Available from: http://etd.lib.nsysu.edu.tw/ETD-db/ETD-search/view_etd?URN=etd-0812109-202320.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Cheng Y. One-Round Mutual Authentication Mechanism Based on Symmetric-Key Cryptosystems with Forward Secrecy and Location Privacy for Wireless Networks. [Thesis]. NSYSU; 2009. Available from: http://etd.lib.nsysu.edu.tw/ETD-db/ETD-search/view_etd?URN=etd-0812109-202320

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


Brno University of Technology

19. Tkáč, Peter. Autentizácia, autorizácia a účtovanie paketových prenosov v mobilných sieťach .

Degree: 2015, Brno University of Technology

 Práca sa zaoberá princípmi autentizácie, autorizácie a účtovania v paketových mobilných sieťach. V práci je popísaný vývoj mobilných sietí štvrtej generácie, architektúra týchto sietí a… (more)

Subjects/Keywords: LTE; mobilná sieť; autentizácia; autorizácia; účtovanie; LTE; mobile network; authentication; authorization; charging

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Tkáč, P. (2015). Autentizácia, autorizácia a účtovanie paketových prenosov v mobilných sieťach . (Thesis). Brno University of Technology. Retrieved from http://hdl.handle.net/11012/41365

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Tkáč, Peter. “Autentizácia, autorizácia a účtovanie paketových prenosov v mobilných sieťach .” 2015. Thesis, Brno University of Technology. Accessed October 14, 2019. http://hdl.handle.net/11012/41365.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Tkáč, Peter. “Autentizácia, autorizácia a účtovanie paketových prenosov v mobilných sieťach .” 2015. Web. 14 Oct 2019.

Vancouver:

Tkáč P. Autentizácia, autorizácia a účtovanie paketových prenosov v mobilných sieťach . [Internet] [Thesis]. Brno University of Technology; 2015. [cited 2019 Oct 14]. Available from: http://hdl.handle.net/11012/41365.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Tkáč P. Autentizácia, autorizácia a účtovanie paketových prenosov v mobilných sieťach . [Thesis]. Brno University of Technology; 2015. Available from: http://hdl.handle.net/11012/41365

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


Luleå University of Technology

20. Plankina, Darya. Suitability of User Authentication Solutions on Mobile Devices Used by People with Dementia.

Degree: 2011, Luleå University of Technology

The aim of this thesis work is to investigate whether any existing authentication techniques can be considered as suitable and usable solutions for authentication(more)

Subjects/Keywords: Technology; suitability; authentication solution; memory supportive ICT; mobile cognitive device; people with mild dementia; MemoryLane Mobile Cognitive Assistant; voice recognition; Teknik

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Plankina, D. (2011). Suitability of User Authentication Solutions on Mobile Devices Used by People with Dementia. (Thesis). Luleå University of Technology. Retrieved from http://urn.kb.se/resolve?urn=urn:nbn:se:ltu:diva-42281

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Plankina, Darya. “Suitability of User Authentication Solutions on Mobile Devices Used by People with Dementia.” 2011. Thesis, Luleå University of Technology. Accessed October 14, 2019. http://urn.kb.se/resolve?urn=urn:nbn:se:ltu:diva-42281.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Plankina, Darya. “Suitability of User Authentication Solutions on Mobile Devices Used by People with Dementia.” 2011. Web. 14 Oct 2019.

Vancouver:

Plankina D. Suitability of User Authentication Solutions on Mobile Devices Used by People with Dementia. [Internet] [Thesis]. Luleå University of Technology; 2011. [cited 2019 Oct 14]. Available from: http://urn.kb.se/resolve?urn=urn:nbn:se:ltu:diva-42281.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Plankina D. Suitability of User Authentication Solutions on Mobile Devices Used by People with Dementia. [Thesis]. Luleå University of Technology; 2011. Available from: http://urn.kb.se/resolve?urn=urn:nbn:se:ltu:diva-42281

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


Indian Institute of Science

21. Babu, B Sathish. A Dynamic Security And Authentication System For Mobile Transactions : A Cognitive Agents Based Approach.

Degree: 2009, Indian Institute of Science

 In the world of high mobility, there is a growing need for people to communicate with each other and have timely access to information regardless… (more)

Subjects/Keywords: Mobile Transactions; Mobile Communication; Computer And Communication Security; Mobile Communications - Security; Mobile Transactions - Authentication; Mobile Transactions - Security; Behaviors-Observations-Beliefs (BOB) Model; Transactions Classification Model; Cognitive Agents; Transactions-Based Security Selection Scheme (TBSS-Scheme); Mobile Multimedia Applications; Mobile e-Commerce; Mobile Multimedia Services; Communication Engineering

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Babu, B. S. (2009). A Dynamic Security And Authentication System For Mobile Transactions : A Cognitive Agents Based Approach. (Thesis). Indian Institute of Science. Retrieved from http://hdl.handle.net/2005/1029

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Babu, B Sathish. “A Dynamic Security And Authentication System For Mobile Transactions : A Cognitive Agents Based Approach.” 2009. Thesis, Indian Institute of Science. Accessed October 14, 2019. http://hdl.handle.net/2005/1029.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Babu, B Sathish. “A Dynamic Security And Authentication System For Mobile Transactions : A Cognitive Agents Based Approach.” 2009. Web. 14 Oct 2019.

Vancouver:

Babu BS. A Dynamic Security And Authentication System For Mobile Transactions : A Cognitive Agents Based Approach. [Internet] [Thesis]. Indian Institute of Science; 2009. [cited 2019 Oct 14]. Available from: http://hdl.handle.net/2005/1029.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Babu BS. A Dynamic Security And Authentication System For Mobile Transactions : A Cognitive Agents Based Approach. [Thesis]. Indian Institute of Science; 2009. Available from: http://hdl.handle.net/2005/1029

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


University of Oulu

22. Namal, S. (Suneth). Enhanced communication security and mobility management in small-cell networks.

Degree: 2014, University of Oulu

Abstract Software-Defined Networks (SDN) focus on addressing the challenges of increased complexity and unified communication, for which the conventional networks are not optimally suited due… (more)

Subjects/Keywords: authentication; fast initial authentication; mobile femtocells; software defined networking; mobiilit femtosolut; nopea alustava varmennus; ohjelmisto-ohjattu verkko; varmentaminen; Host Identity Protocol; OMNet++; OpenFlow

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Namal, S. (. (2014). Enhanced communication security and mobility management in small-cell networks. (Doctoral Dissertation). University of Oulu. Retrieved from http://urn.fi/urn:isbn:9789526206370

Chicago Manual of Style (16th Edition):

Namal, S (Suneth). “Enhanced communication security and mobility management in small-cell networks.” 2014. Doctoral Dissertation, University of Oulu. Accessed October 14, 2019. http://urn.fi/urn:isbn:9789526206370.

MLA Handbook (7th Edition):

Namal, S (Suneth). “Enhanced communication security and mobility management in small-cell networks.” 2014. Web. 14 Oct 2019.

Vancouver:

Namal S(. Enhanced communication security and mobility management in small-cell networks. [Internet] [Doctoral dissertation]. University of Oulu; 2014. [cited 2019 Oct 14]. Available from: http://urn.fi/urn:isbn:9789526206370.

Council of Science Editors:

Namal S(. Enhanced communication security and mobility management in small-cell networks. [Doctoral Dissertation]. University of Oulu; 2014. Available from: http://urn.fi/urn:isbn:9789526206370


University of Bradford

23. Mapoka, Trust Tshepo. Location based authenticated multi-services group key management for cyber security in high speed broadband wireless multicast communications : multi-service group key management scheme with location based handover authentication for multi-handoffs participating in multi-group service subscriptions, its performance evaluation and security correctness in high speed broadband wireless multicast communications.

Degree: PhD, 2015, University of Bradford

 Secure information exchanges over cyberspace is on the increase due to the convergence of wireless and mobile access technologies in all businesses. Accordingly, with the… (more)

Subjects/Keywords: Cyber security; Location based user authentication; Handover authentication; Multi-Service Group Key Management (GKM); High speed broadband; Wireless networks; Mobile multicast communication; Mobility management; Domain key distributor (DKD); BAN logic

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Mapoka, T. T. (2015). Location based authenticated multi-services group key management for cyber security in high speed broadband wireless multicast communications : multi-service group key management scheme with location based handover authentication for multi-handoffs participating in multi-group service subscriptions, its performance evaluation and security correctness in high speed broadband wireless multicast communications. (Doctoral Dissertation). University of Bradford. Retrieved from http://hdl.handle.net/10454/14468

Chicago Manual of Style (16th Edition):

Mapoka, Trust Tshepo. “Location based authenticated multi-services group key management for cyber security in high speed broadband wireless multicast communications : multi-service group key management scheme with location based handover authentication for multi-handoffs participating in multi-group service subscriptions, its performance evaluation and security correctness in high speed broadband wireless multicast communications.” 2015. Doctoral Dissertation, University of Bradford. Accessed October 14, 2019. http://hdl.handle.net/10454/14468.

MLA Handbook (7th Edition):

Mapoka, Trust Tshepo. “Location based authenticated multi-services group key management for cyber security in high speed broadband wireless multicast communications : multi-service group key management scheme with location based handover authentication for multi-handoffs participating in multi-group service subscriptions, its performance evaluation and security correctness in high speed broadband wireless multicast communications.” 2015. Web. 14 Oct 2019.

Vancouver:

Mapoka TT. Location based authenticated multi-services group key management for cyber security in high speed broadband wireless multicast communications : multi-service group key management scheme with location based handover authentication for multi-handoffs participating in multi-group service subscriptions, its performance evaluation and security correctness in high speed broadband wireless multicast communications. [Internet] [Doctoral dissertation]. University of Bradford; 2015. [cited 2019 Oct 14]. Available from: http://hdl.handle.net/10454/14468.

Council of Science Editors:

Mapoka TT. Location based authenticated multi-services group key management for cyber security in high speed broadband wireless multicast communications : multi-service group key management scheme with location based handover authentication for multi-handoffs participating in multi-group service subscriptions, its performance evaluation and security correctness in high speed broadband wireless multicast communications. [Doctoral Dissertation]. University of Bradford; 2015. Available from: http://hdl.handle.net/10454/14468


Université Catholique de Louvain

24. Aboudagga, Nidal. Authentication management for secure seamless mobility.

Degree: 2008, Université Catholique de Louvain

The immense success of wireless and broadband technologies over the last decade has been accompanied with an increasing number of wireless networks owned by different… (more)

Subjects/Keywords: Security; Mobile networks; Wireless networks; Authentication; Roaming

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Aboudagga, N. (2008). Authentication management for secure seamless mobility. (Thesis). Université Catholique de Louvain. Retrieved from http://hdl.handle.net/2078.1/20849

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Aboudagga, Nidal. “Authentication management for secure seamless mobility.” 2008. Thesis, Université Catholique de Louvain. Accessed October 14, 2019. http://hdl.handle.net/2078.1/20849.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Aboudagga, Nidal. “Authentication management for secure seamless mobility.” 2008. Web. 14 Oct 2019.

Vancouver:

Aboudagga N. Authentication management for secure seamless mobility. [Internet] [Thesis]. Université Catholique de Louvain; 2008. [cited 2019 Oct 14]. Available from: http://hdl.handle.net/2078.1/20849.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Aboudagga N. Authentication management for secure seamless mobility. [Thesis]. Université Catholique de Louvain; 2008. Available from: http://hdl.handle.net/2078.1/20849

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

25. Karatzouni, Sevasti. Non-intrusive continuous user authentication for mobile devices.

Degree: PhD, 2014, University of Plymouth

 The modern mobile device has become an everyday tool for users and business. Technological advancements in the device itself and the networks that connect them… (more)

Subjects/Keywords: 005.8; user authentication, biometrics, mobile, information security

…user authentication for mobile devices”, Computer Fraud & Security, Volume 2008, Issue 8… …x28;2009): “Flexible and Transparent User Authentication for Mobile Devices”, Proceedings of… …Device- versus Network-Centric Authentication Paradigms for Mobile Devices: Operational and… …Biometrics for Transparent Authentication on Mobile Devices”, Proceedings of the 2nd International… …of User Authentication on Mobile Devices”, Proceedings of the ISOneWorld Conference, Las… 

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Karatzouni, S. (2014). Non-intrusive continuous user authentication for mobile devices. (Doctoral Dissertation). University of Plymouth. Retrieved from http://hdl.handle.net/10026.1/3225

Chicago Manual of Style (16th Edition):

Karatzouni, Sevasti. “Non-intrusive continuous user authentication for mobile devices.” 2014. Doctoral Dissertation, University of Plymouth. Accessed October 14, 2019. http://hdl.handle.net/10026.1/3225.

MLA Handbook (7th Edition):

Karatzouni, Sevasti. “Non-intrusive continuous user authentication for mobile devices.” 2014. Web. 14 Oct 2019.

Vancouver:

Karatzouni S. Non-intrusive continuous user authentication for mobile devices. [Internet] [Doctoral dissertation]. University of Plymouth; 2014. [cited 2019 Oct 14]. Available from: http://hdl.handle.net/10026.1/3225.

Council of Science Editors:

Karatzouni S. Non-intrusive continuous user authentication for mobile devices. [Doctoral Dissertation]. University of Plymouth; 2014. Available from: http://hdl.handle.net/10026.1/3225

26. Kunning, Mao. Strong Authentication Protocol using PIV Card with Mobile Devices.

Degree: Information and Communication Technology (ICT), 2013, KTH

  Nowadays weak single-factor authentication mechanisms like passwords or passphrases are commonly used. Static passwords are easy to use, just remember them in mind. However… (more)

Subjects/Keywords: Mobile Applications Security; Strong Authentication; Smart Card

…for the distribution, activation, and reuse of tokens for strong mobile authentication. Soft… …solutions for certificate–based strong authentication protocol implemented in Java, and a mobile… …knowledge of strong authentication and mobile security  Chapter 3: In this chapter, it will… …introduce security authentication for mobile applications and describe some existing mobile phone… …card. 5. Mobile security application sends certificate for strong authentication to SA server… 

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Kunning, M. (2013). Strong Authentication Protocol using PIV Card with Mobile Devices. (Thesis). KTH. Retrieved from http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-128418

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Kunning, Mao. “Strong Authentication Protocol using PIV Card with Mobile Devices.” 2013. Thesis, KTH. Accessed October 14, 2019. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-128418.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Kunning, Mao. “Strong Authentication Protocol using PIV Card with Mobile Devices.” 2013. Web. 14 Oct 2019.

Vancouver:

Kunning M. Strong Authentication Protocol using PIV Card with Mobile Devices. [Internet] [Thesis]. KTH; 2013. [cited 2019 Oct 14]. Available from: http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-128418.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Kunning M. Strong Authentication Protocol using PIV Card with Mobile Devices. [Thesis]. KTH; 2013. Available from: http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-128418

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

27. Molla, Rania A. Mobile user authentication system (MUAS) for e-commerce applications.

Degree: PhD, 2017, Edinburgh Napier University

 The rapid growth of e-commerce has many associated security concerns. Thus, several studies to develop secure online authentication systems have emerged. Most studies begin with… (more)

Subjects/Keywords: 005; E-commerce; Security; Mobile User Authentication; 005 Computer programming, programs & data; QA75 Electronic computers. Computer science

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Molla, R. A. (2017). Mobile user authentication system (MUAS) for e-commerce applications. (Doctoral Dissertation). Edinburgh Napier University. Retrieved from http://researchrepository.napier.ac.uk/Output/1035289 ; https://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.754121

Chicago Manual of Style (16th Edition):

Molla, Rania A. “Mobile user authentication system (MUAS) for e-commerce applications.” 2017. Doctoral Dissertation, Edinburgh Napier University. Accessed October 14, 2019. http://researchrepository.napier.ac.uk/Output/1035289 ; https://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.754121.

MLA Handbook (7th Edition):

Molla, Rania A. “Mobile user authentication system (MUAS) for e-commerce applications.” 2017. Web. 14 Oct 2019.

Vancouver:

Molla RA. Mobile user authentication system (MUAS) for e-commerce applications. [Internet] [Doctoral dissertation]. Edinburgh Napier University; 2017. [cited 2019 Oct 14]. Available from: http://researchrepository.napier.ac.uk/Output/1035289 ; https://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.754121.

Council of Science Editors:

Molla RA. Mobile user authentication system (MUAS) for e-commerce applications. [Doctoral Dissertation]. Edinburgh Napier University; 2017. Available from: http://researchrepository.napier.ac.uk/Output/1035289 ; https://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.754121


Brno University of Technology

28. Križan, Viliam. Autentizace pomocí mobilního telefonu .

Degree: 2013, Brno University of Technology

 Bakalárska práca popisuje základné autentizačné metódy znalosťou, používané autentizačné predmety a biometrické spôsoby autentizácie. Rozoberá možnosti aplikácie jednotlivých metód určených pre mobilné telefóny. Zaoberá sa… (more)

Subjects/Keywords: Android; anonymita; autentizácia; Java; mobilný telefón; NFC; poverovacie tokeny; Android; Anonymity; Authentication; Credentials; Mobile phone; NFC; Java

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Križan, V. (2013). Autentizace pomocí mobilního telefonu . (Thesis). Brno University of Technology. Retrieved from http://hdl.handle.net/11012/28240

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Križan, Viliam. “Autentizace pomocí mobilního telefonu .” 2013. Thesis, Brno University of Technology. Accessed October 14, 2019. http://hdl.handle.net/11012/28240.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Križan, Viliam. “Autentizace pomocí mobilního telefonu .” 2013. Web. 14 Oct 2019.

Vancouver:

Križan V. Autentizace pomocí mobilního telefonu . [Internet] [Thesis]. Brno University of Technology; 2013. [cited 2019 Oct 14]. Available from: http://hdl.handle.net/11012/28240.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Križan V. Autentizace pomocí mobilního telefonu . [Thesis]. Brno University of Technology; 2013. Available from: http://hdl.handle.net/11012/28240

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


New Jersey Institute of Technology

29. Al-Saber, Nabeel. Kerberos phone secure messenger.

Degree: MSin Computer Engineering - (M.S.), Electrical and Computer Engineering, 2007, New Jersey Institute of Technology

  Security is becoming vital in today's open insecure Internet. While popular Internet enabled mobile devices are spreading widely, the security of such platforms is… (more)

Subjects/Keywords: Kerberos authentication protocol; Mobile phones; Security; Computer Engineering

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Al-Saber, N. (2007). Kerberos phone secure messenger. (Thesis). New Jersey Institute of Technology. Retrieved from https://digitalcommons.njit.edu/theses/317

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Al-Saber, Nabeel. “Kerberos phone secure messenger.” 2007. Thesis, New Jersey Institute of Technology. Accessed October 14, 2019. https://digitalcommons.njit.edu/theses/317.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Al-Saber, Nabeel. “Kerberos phone secure messenger.” 2007. Web. 14 Oct 2019.

Vancouver:

Al-Saber N. Kerberos phone secure messenger. [Internet] [Thesis]. New Jersey Institute of Technology; 2007. [cited 2019 Oct 14]. Available from: https://digitalcommons.njit.edu/theses/317.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Al-Saber N. Kerberos phone secure messenger. [Thesis]. New Jersey Institute of Technology; 2007. Available from: https://digitalcommons.njit.edu/theses/317

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


New Jersey Institute of Technology

30. Zhu, Qing. Two factor authentication and authorization in ubiquitous mobile computing.

Degree: MSin Computer Engineering - (M.S.), Electrical and Computer Engineering, 2007, New Jersey Institute of Technology

  Handheld devices, such as mobile phones, PDAs and others, have become an integrated part of our lives. They are perfectly suitable to become the… (more)

Subjects/Keywords: Network authentication; Network authorization; Mobile computing; Computer Engineering

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Zhu, Q. (2007). Two factor authentication and authorization in ubiquitous mobile computing. (Thesis). New Jersey Institute of Technology. Retrieved from https://digitalcommons.njit.edu/theses/348

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Zhu, Qing. “Two factor authentication and authorization in ubiquitous mobile computing.” 2007. Thesis, New Jersey Institute of Technology. Accessed October 14, 2019. https://digitalcommons.njit.edu/theses/348.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Zhu, Qing. “Two factor authentication and authorization in ubiquitous mobile computing.” 2007. Web. 14 Oct 2019.

Vancouver:

Zhu Q. Two factor authentication and authorization in ubiquitous mobile computing. [Internet] [Thesis]. New Jersey Institute of Technology; 2007. [cited 2019 Oct 14]. Available from: https://digitalcommons.njit.edu/theses/348.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Zhu Q. Two factor authentication and authorization in ubiquitous mobile computing. [Thesis]. New Jersey Institute of Technology; 2007. Available from: https://digitalcommons.njit.edu/theses/348

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

[1] [2]

.