12   Artículos

 
en línea
Joseph M. Ackerson, Rushit Dave and Naeem Seliya    
Recurrent Neural Networks are powerful machine learning frameworks that allow for data to be saved and referenced in a temporal sequence. This opens many new possibilities in fields such as handwriting analysis and speech recognition. This paper seeks to... ver más
Revista: Information    Formato: Electrónico

 
en línea
Guma Ali, Mussa Ally Dida and Anael Elikana Sam    
With the expansion of smartphone and financial technologies (FinTech), mobile money emerged to improve financial inclusion in many developing nations. The majority of the mobile money schemes used in these nations implement two-factor authentication (2FA... ver más
Revista: Future Internet    Formato: Electrónico

 
en línea
Yaser Ali Enaya,Mohammed Jawad Mohammed,Ghassan Abdulhussein Bilal     Pág. pp. 163 - 179
This study introduces a novel authentication methodology; it is based on pattern recognition of fingers size and pressure when users touch smartphone screen. By analyzing diagrams of these touches and applying data mining for the first time as an authent... ver más

 
en línea
Qurban A Memon     Pág. pp. 222 - 230
As technological advances in smartphone domain increase, so are the issues that pertain to security and privacy. In current literature, multimodal biometric approach is addressed at length for purpose of improving secured access into personal devices. Mo... ver más

 
en línea
Guma Ali, Mussa Ally Dida and Anael Elikana Sam    
Smartphone technology has improved access to mobile money services (MMS) and successful mobile money deployment has brought massive benefits to the unbanked population in both rural and urban areas of Uganda. Despite its enormous benefits, embracing the ... ver más
Revista: Information    Formato: Electrónico

 
en línea
Jinseong Kim and Im Y. Jung    
Android applications store large amounts of sensitive information that may be exposed and exploited. To prevent this security risk, some applications such as Syrup and KakaoTalk use physical device values to authenticate or encrypt application data. Howe... ver más
Revista: Sustainability    Formato: Electrónico

 
en línea
Fernando Kaway Carvalho Ota, Michael Roland, Michael Hölzl, René Mayrhofer and Aleardo Manacero    
Traditional authentication methods (e.g., password, PIN) often do not scale well to the context of mobile devices in terms of security and usability. However, the adoption of Near Field Communication (NFC) on a broad range of smartphones enables the use ... ver más
Revista: Information    Formato: Electrónico

« Anterior     Página: 1 de 1     Siguiente »