Continuous user authentication in mobile device and IoT environment
The conventional authentication methods, such as password authentication, fingerprint recognition and face recognition, have many drawbacks and disadvantages. The conventional authentication methods are snapshot and one-time authentication with a very high risk of being hacked. In the early days, th...
Saved in:
Main Author: | Liu, Allen Yang |
---|---|
Other Authors: | Ng Wee Keong |
Format: | Thesis-Master by Research |
Language: | English |
Published: |
Nanyang Technological University
2020
|
Subjects: | |
Online Access: | https://hdl.handle.net/10356/143089 |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
Institution: | Nanyang Technological University |
Language: | English |
Similar Items
-
IoT : development of a home automation system
by: Ku , Edwin Jun Hao
Published: (2022) -
Practical cold boot attack on IoT device - Case study on Raspberry Pi -
by: Won, Yoo-Seung, et al.
Published: (2021) -
Mobile application for IoT devices
by: Low, Delwyn Jia Wei
Published: (2023) -
Integrating a web service and an iOS application through cloud computing
by: Sidhant Jain.
Published: (2012) -
Yet another iOS music player app - player++ V2
by: Tan, Eunice Mei Jie
Published: (2017)