Open Access
A secure user authentication scheme for critical mobile applications
TLDR
Smartphones have facilitated tasks in private and work life for its users and in business, employees often should manage sensitive data that unauthorised people cannot access, so some user authentications are needed.Abstract:
Smartphones have facilitated tasks in private and work life for its users. In business,employees often should manage sensitive data that unauthorised people cannot access,so some user authenticatio ...read more
Citations
More filters
Journal ArticleDOI
A Landmark Based Shortest Path Detection by Using A* and Haversine Formula
TL;DR: In this paper, a nonspecific plot for navigating a route throughout city A asked route is given by utilizing combination of A* Algorithm and Haversine Equation gives least distance between any two focuses on spherical body by utilizing latitude and longitude.
References
More filters
ReportDOI
The NIST Definition of Cloud Computing
Peter Mell,Timothy Grance +1 more
TL;DR: This cloud model promotes availability and is composed of five essential characteristics, three service models, and four deployment models.
Journal ArticleDOI
Location Fingerprinting With Bluetooth Low Energy Beacons
Ramsey Faragher,Robert Harle +1 more
TL;DR: This work provides a detailed study of BLE fingerprinting using 19 beacons distributed around a ~600 m2 testbed to position a consumer device, and investigates the choice of key parameters in a BLE positioning system, including beacon density, transmit power, and transmit frequency.
Proceedings ArticleDOI
GEO-RBAC: a spatially aware RBAC
TL;DR: This paper presents GEO-RBAC, an extension of the RBAC model to deal with spatial and location-based information and introduces the concept of role schema, which is extended to cope with hierarchies, modeling permission, user, and activation inheritance.
Journal ArticleDOI
Evaluation of position tracking technologies for user localization in indoor construction environments
Hiam Khoury,Vineet R. Kamat +1 more
TL;DR: Experimental results demonstrate the ability of Indoor GPS, in particular, to estimate a mobile user's location with relatively low uncertainty (1 to 2 cm).
Proceedings ArticleDOI
Users' conceptions of web security: a comparative study
TL;DR: The results show that many users across the three diverse communities mistakently evaluated whether a connection is secure or not secure.
Related Papers (5)
Privacy Preserving and Ownership Authentication in Ubiquitous Computing Devices using Secure Three Way Authentication
B H Pradeep,Sanjay Singh +1 more