scispace - formally typeset
Open Access

A secure user authentication scheme for critical mobile applications

TLDR
Smartphones have facilitated tasks in private and work life for its users and in business, employees often should manage sensitive data that unauthorised people cannot access, so some user authentications are needed.
Abstract
Smartphones have facilitated tasks in private and work life for its users. In business,employees often should manage sensitive data that unauthorised people cannot access,so some user authenticatio ...

read more

Citations
More filters
Journal ArticleDOI

A Landmark Based Shortest Path Detection by Using A* and Haversine Formula

TL;DR: In this paper, a nonspecific plot for navigating a route throughout city A asked route is given by utilizing combination of A* Algorithm and Haversine Equation gives least distance between any two focuses on spherical body by utilizing latitude and longitude.
References
More filters
ReportDOI

The NIST Definition of Cloud Computing

Peter Mell, +1 more
TL;DR: This cloud model promotes availability and is composed of five essential characteristics, three service models, and four deployment models.
Journal ArticleDOI

Location Fingerprinting With Bluetooth Low Energy Beacons

TL;DR: This work provides a detailed study of BLE fingerprinting using 19 beacons distributed around a ~600 m2 testbed to position a consumer device, and investigates the choice of key parameters in a BLE positioning system, including beacon density, transmit power, and transmit frequency.
Proceedings ArticleDOI

GEO-RBAC: a spatially aware RBAC

TL;DR: This paper presents GEO-RBAC, an extension of the RBAC model to deal with spatial and location-based information and introduces the concept of role schema, which is extended to cope with hierarchies, modeling permission, user, and activation inheritance.
Journal ArticleDOI

Evaluation of position tracking technologies for user localization in indoor construction environments

TL;DR: Experimental results demonstrate the ability of Indoor GPS, in particular, to estimate a mobile user's location with relatively low uncertainty (1 to 2 cm).
Proceedings ArticleDOI

Users' conceptions of web security: a comparative study

TL;DR: The results show that many users across the three diverse communities mistakently evaluated whether a connection is secure or not secure.
Related Papers (5)