The Fifth International Conference on the Applications of Digital Information and Web Technologies (ICADIWT 2014) 2014
DOI: 10.1109/icadiwt.2014.6814702
|View full text |Cite
|
Sign up to set email alerts
|

Personalized authentication procedure for restricted web service access in mobile phones

Abstract: Security as a condition is the degree of resistance to, or protection from harm. Securing gadgets in a way that is simple for the user to deploy yet, stringent enough to deny any malware intrusions onto the protected circle is investigated to find a balance between the extremes. Basically, the dominant approach on current control access is via password or PIN, but its flaw is being clearly documented. An application (to be incorporated in a mobile phone) that allows the user's gadget to be used as a Biometric … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2

Citation Types

0
12
0

Year Published

2017
2017
2023
2023

Publication Types

Select...
5
3
1

Relationship

0
9

Authors

Journals

citations
Cited by 15 publications
(12 citation statements)
references
References 13 publications
0
12
0
Order By: Relevance
“…Diagnosis and management of postpartum haemorrhage." Diagnosis and management of postpartum haemorrhage by Edwin Chandraharan [8] addresses an issue on Vaginal tears, cervical damage under macrosomy conditions [15][16][17][18][19][20].…”
Section: Related Workmentioning
confidence: 99%
“…Diagnosis and management of postpartum haemorrhage." Diagnosis and management of postpartum haemorrhage by Edwin Chandraharan [8] addresses an issue on Vaginal tears, cervical damage under macrosomy conditions [15][16][17][18][19][20].…”
Section: Related Workmentioning
confidence: 99%
“…The author uses Internet of things with Arduino and Raspberry pi to execute the project. In [7] the author has used two machine learning algorithms one is multi target regression model and another one is recurrent neural network model .using these two models they have predicted rainfall possibilities, temperature and humidity [8][9][10][11][12][13][14][15].…”
Section: Related Workmentioning
confidence: 99%
“…They present correlation results between the proposed strategy and agent AI based recognition calculations. [10][11][12][13]…”
Section: Introductionmentioning
confidence: 99%