Authentication securing methods for mobile identity: issues, solutions and challenges
Smartphone devices have become an essential part of our daily activities for performing various essential applications containing very confidential information. For this reason, the security of the device and the transactions is required to ensure that the transactions are performed legally. Most re...
| Main Authors: | Ahmad Zukarnain, Zuriati, Muneer, Amgad, Ab Aziz, Mohd Khairulanuar |
|---|---|
| Format: | Article |
| Published: |
MDPI
2022
|
| Online Access: | http://psasir.upm.edu.my/id/eprint/100493/ |
Similar Items
Online identity theft, security issues, and reputational damage
by: Ahmad Zukarnain, Zuriati, et al.
Published: (2021)
by: Ahmad Zukarnain, Zuriati, et al.
Published: (2021)
A survey on addressing iot security issues by embedding blockchain technology solutions: review, attacks, current trends, and applications
by: Huan, Nathalie Tan Yhe, et al.
Published: (2024)
by: Huan, Nathalie Tan Yhe, et al.
Published: (2024)
Quantum identity authentication for non-entanglement multiparty communication: A review, state of art and future directions
by: Azahari, Nur Shahirah, et al.
Published: (2023)
by: Azahari, Nur Shahirah, et al.
Published: (2023)
Mobility support across hybrid IP-based wireless environment : review of concepts, solutions and related issues.
by: Heidarinezhad, Mohammad Reza, et al.
Published: (2009)
by: Heidarinezhad, Mohammad Reza, et al.
Published: (2009)
Vehicular ad hoc networks and security issues: survey
by: Abdulkader, Zaid A., et al.
Published: (2017)
by: Abdulkader, Zaid A., et al.
Published: (2017)
Secure authentication for sensitive digital systems in mobile devices
by: Hussein, Khalid Waleed
Published: (2016)
by: Hussein, Khalid Waleed
Published: (2016)
Secured shared authentication key with two-way clock synchronization over multiparty Quantum Communication (KIV)
by: Azahari, Nur Shahirah, et al.
Published: (2023)
by: Azahari, Nur Shahirah, et al.
Published: (2023)
Multicast security : issues and solutions
by: Qabajeh, Mohammad M., et al.
Published: (2011)
by: Qabajeh, Mohammad M., et al.
Published: (2011)
Challenges in online secure authentication and authorization methodology: a review
by: Dar, Humaira, et al.
Published: (2013)
by: Dar, Humaira, et al.
Published: (2013)
Fast and secure handover authentication scheme in Mobile WiMax
by: Zmezm, Hamzah F., et al.
Published: (2014)
by: Zmezm, Hamzah F., et al.
Published: (2014)
Recent advances in mobile touch screen security authentication methods: a systematic literature review
by: Ibrahim, Tahir Musa, et al.
Published: (2019)
by: Ibrahim, Tahir Musa, et al.
Published: (2019)
Blockchain Security Hole: Issues and Solutions
by: Norul Suhaliana, Abd Halim, et al.
Published: (2018)
by: Norul Suhaliana, Abd Halim, et al.
Published: (2018)
IoT security: Challenges and solutions for mining
by: Barrie, Glenn, et al.
Published: (2017)
by: Barrie, Glenn, et al.
Published: (2017)
An Authentication Method for Secure Internet Transaction Using Smart Card and Secure Coprocessor
by: Ayad, Mustafa Abdsalam
Published: (2002)
by: Ayad, Mustafa Abdsalam
Published: (2002)
DTASR: Dual Threshold-based authentication for secure routing in mobile adhoc network
by: Khan, Burhan ul Islam, et al.
Published: (2015)
by: Khan, Burhan ul Islam, et al.
Published: (2015)
DTASR: Dual Threshold-based authentication for secure routing in mobile adhoc network
by: Khan, Burhan ul Islam, et al.
Published: (2015)
by: Khan, Burhan ul Islam, et al.
Published: (2015)
Comprehensive review of drones collision avoidance schemes: challenges and open issues
by: Rezaee, Mohammad Reza, et al.
Published: (2024)
by: Rezaee, Mohammad Reza, et al.
Published: (2024)
Medical identity theft in telemedicine: solving the privacy and security issues
by: Olanrewaju, Rashidah Funke, et al.
Published: (2015)
by: Olanrewaju, Rashidah Funke, et al.
Published: (2015)
Cloud computing security threat with quantum key distribution defense model
by: Khalid, Roszelinda, et al.
Published: (2015)
by: Khalid, Roszelinda, et al.
Published: (2015)
Improved fast handover method for multiple node by using mobile nodes guide
by: M. Abdullah, Radhwan, et al.
Published: (2017)
by: M. Abdullah, Radhwan, et al.
Published: (2017)
Watermark blending technique for securing user authentication data in mobile application systems
by: Mohamed, Kartini, et al.
Published: (2019)
by: Mohamed, Kartini, et al.
Published: (2019)
Rhetoric of food authenticity and national identity in the new media
by: Jamaluddin Aziz,, et al.
Published: (2021)
by: Jamaluddin Aziz,, et al.
Published: (2021)
Security in wireless sensor networks: issues and challenges
by: Pathan, Al-Sakib Khan, et al.
Published: (2006)
by: Pathan, Al-Sakib Khan, et al.
Published: (2006)
Blockchain technology for security issues and challenges in IoT
by: Kumar, Nallapaneni Manoj, et al.
Published: (2018)
by: Kumar, Nallapaneni Manoj, et al.
Published: (2018)
Issues relating to residential neighbourhood security challenges
by: Olajide, Sunday Emmanuel, et al.
Published: (2017)
by: Olajide, Sunday Emmanuel, et al.
Published: (2017)
Issues and security measures of mobile banking apps
by: Hayikader, Sameer, et al.
Published: (2016)
by: Hayikader, Sameer, et al.
Published: (2016)
Secure login authentication system
by: Chow, Wen Chai
Published: (2018)
by: Chow, Wen Chai
Published: (2018)
Stegano-image as a digital signature to improve security authentication system in mobile computing
by: Mantoro, Teddy, et al.
Published: (2016)
by: Mantoro, Teddy, et al.
Published: (2016)
A review on high frequency trading forecasting methods: opportunity and challenges for quantum based method
by: Palaniappan, Visalakshi, et al.
Published: (2024)
by: Palaniappan, Visalakshi, et al.
Published: (2024)
Enterprise security policy : challenges and issues for Malaysian universities
by: Ibrahim, Jamaludin
Published: (2011)
by: Ibrahim, Jamaludin
Published: (2011)
Wireless Networks and Security: Issues, Challenges and Research Trends
by: Khan, Shafiullah, et al.
Published: (2012)
by: Khan, Shafiullah, et al.
Published: (2012)
A survey on privacy-preserving authentication schemes in VANETs: attacks, challenges and open issues
by: Ahmed Jan, Sagheer, et al.
Published: (2021)
by: Ahmed Jan, Sagheer, et al.
Published: (2021)
Character property method for Arabic text steganography with biometric multifactor authentication using liveness detection
by: Roslan, Nuur Alifah, et al.
Published: (2020)
by: Roslan, Nuur Alifah, et al.
Published: (2020)
A Secured Fingerprint Authentication System
by: Islam, Md. Rajibul, et al.
Published: (2008)
by: Islam, Md. Rajibul, et al.
Published: (2008)
An improved secure authentication in lightweight IoT
by: Mohd Ariffin, Noor Afiza, et al.
Published: (2023)
by: Mohd Ariffin, Noor Afiza, et al.
Published: (2023)
A lightweight identity-based Rivest-Shamir-Adleman authentication scheme for mobile ad hoc networks
by: Eissa, Tameem
Published: (2011)
by: Eissa, Tameem
Published: (2011)
Bring your own device: security challenges and a theoretical framework for two-factor authentication
by: Olalere, Morufu, et al.
Published: (2016)
by: Olalere, Morufu, et al.
Published: (2016)
Internet of things: the concept, inherent security challenges
and recommended solutions
by: Khan, Burhan Ul Islam, et al.
Published: (2019)
by: Khan, Burhan Ul Islam, et al.
Published: (2019)
An enhanced group mobility managemnt method in wireless body area networks
by: Abdullah, Mohamed Radhwan, et al.
Published: (2019)
by: Abdullah, Mohamed Radhwan, et al.
Published: (2019)
Challenging Authentic Digital Scenarios
by: Ifenthaler, Dirk
Published: (2016)
by: Ifenthaler, Dirk
Published: (2016)
Similar Items
-
Online identity theft, security issues, and reputational damage
by: Ahmad Zukarnain, Zuriati, et al.
Published: (2021) -
A survey on addressing iot security issues by embedding blockchain technology solutions: review, attacks, current trends, and applications
by: Huan, Nathalie Tan Yhe, et al.
Published: (2024) -
Quantum identity authentication for non-entanglement multiparty communication: A review, state of art and future directions
by: Azahari, Nur Shahirah, et al.
Published: (2023) -
Mobility support across hybrid IP-based wireless environment : review of concepts, solutions and related issues.
by: Heidarinezhad, Mohammad Reza, et al.
Published: (2009) -
Vehicular ad hoc networks and security issues: survey
by: Abdulkader, Zaid A., et al.
Published: (2017)