Enhancing the strength of user's authentication using multifactor approach for use in mobile application system
Nowadays, we can seen many people are occupied with their mobiles almost anywhere and at anytime. Based on statistics by ICT Facts and Figures, about 6.8 out of 7.1 billion people around the world in 2013 are using mobiles compared to only 2 billion in 2005 and this number is still growing (Sanou, 2...
| Main Authors: | Mohamed, Kartini, Sidi, Fatimah, A. Jabar, Marzanah, Ishak, Iskandar |
|---|---|
| Format: | Conference or Workshop Item |
| Language: | English |
| Published: |
Faculty of Computer Science and Information Technology, Universiti Putra Malaysia
2015
|
| Online Access: | http://psasir.upm.edu.my/id/eprint/77152/ http://psasir.upm.edu.my/id/eprint/77152/1/saes2015-21.pdf |
Similar Items
Watermark blending technique for securing user authentication data in mobile application systems
by: Mohamed, Kartini, et al.
Published: (2019)
by: Mohamed, Kartini, et al.
Published: (2019)
Strengthening user authentication for better protection of mobile application systems
by: Mohamed, Kartini, et al.
Published: (2016)
by: Mohamed, Kartini, et al.
Published: (2016)
Protecting wireless data transmission in mobile application systems using digital watermarking technique
by: Mohamed, Kartini, et al.
Published: (2016)
by: Mohamed, Kartini, et al.
Published: (2016)
An improved user authentication model for mobile application systems
by: Mohamed, Kartini
Published: (2017)
by: Mohamed, Kartini
Published: (2017)
Character property method with biometric multifactor authentication for arabic text steganography
by: Roslan, Nuur Alifah
Published: (2018)
by: Roslan, Nuur Alifah
Published: (2018)
Character property method for Arabic text steganography with biometric multifactor authentication using liveness detection
by: Roslan, Nuur Alifah, et al.
Published: (2020)
by: Roslan, Nuur Alifah, et al.
Published: (2020)
Multifactor approach to prioritize event sequence test cases
by: Ahmad, Johanna
Published: (2018)
by: Ahmad, Johanna
Published: (2018)
Towards improving data quality using ontology application approach
by: Mohd Jaya, Mohd Izham, et al.
Published: (2015)
by: Mohd Jaya, Mohd Izham, et al.
Published: (2015)
Object recognizer for organizing and structuring unstructured documents using Interrogative Knowledge
by: Ishak, Iskandar, et al.
Published: (2016)
by: Ishak, Iskandar, et al.
Published: (2016)
On the structure of multifactor optimal portfolio strategies
by: Dokuchaev, Nikolai
Published: (2017)
by: Dokuchaev, Nikolai
Published: (2017)
A multifactor approach of the APT versus the CAPM for the UK stock market
by: Briffa, Christian
Published: (2008)
by: Briffa, Christian
Published: (2008)
Integration of mobile and web application : an implementation of diabetic management system
by: A. Jabar, Marzanah, et al.
Published: (2013)
by: A. Jabar, Marzanah, et al.
Published: (2013)
Review on user authentication on mobile devices
by: Abdul Gimba, Usman, et al.
Published: (2024)
by: Abdul Gimba, Usman, et al.
Published: (2024)
Graphical user authentication algorithm for mobile banking user
by: Ugochukwu, Ejike Ekeke Kingsley, et al.
Published: (2018)
by: Ugochukwu, Ejike Ekeke Kingsley, et al.
Published: (2018)
A novel watermarking technique in data transmission between QR codes and database
by: Mohamed, Kartini, et al.
Published: (2013)
by: Mohamed, Kartini, et al.
Published: (2013)
User awareness in the authenticity of mobile Quran apps
by: Talib, Shuhaili, et al.
Published: (2016)
by: Talib, Shuhaili, et al.
Published: (2016)
A web-based interrogative ontology retrieval application for unstructured documents
by: Sidi, Fatimah, et al.
Published: (2015)
by: Sidi, Fatimah, et al.
Published: (2015)
Enhancing user authentication for cloud web-based application / Detar Beqo
by: Detar , Beqo
Published: (2018)
by: Detar , Beqo
Published: (2018)
An approach to secure EPUB ebook content
by: Faniband, Yunus Parvej, et al.
Published: (2019)
by: Faniband, Yunus Parvej, et al.
Published: (2019)
Measuring computer security awareness on internet banking and shopping for internet users
by: Sidi, Fatimah, et al.
Published: (2013)
by: Sidi, Fatimah, et al.
Published: (2013)
Effects of Authentication of Users in Mobile Internet Protocol Version 6
by: Obenofunde, Simon Tabi
Published: (2004)
by: Obenofunde, Simon Tabi
Published: (2004)
Framework for evaluating suitability of graphical user authentication for mobile banking
by: Kingsley Ugochukwu, Ejike Ekeke
Published: (2016)
by: Kingsley Ugochukwu, Ejike Ekeke
Published: (2016)
Multifactor leadership questionnaire (rater form 5x-short form)
by: Moey, Soo Foon
Published: (2018)
by: Moey, Soo Foon
Published: (2018)
Evaluation of associative classification-based multifactor dimensionality reduction in the presence of noise
by: Krishna, Aneesh
Published: (2016)
by: Krishna, Aneesh
Published: (2016)
Approaches and technologies in teaching and learning environment
by: Abdullah, Rusli, et al.
Published: (2011)
by: Abdullah, Rusli, et al.
Published: (2011)
Enhancement of a simple user authentication scheme for grid computing
by: Ramamoorthy, Viknesh
Published: (2008)
by: Ramamoorthy, Viknesh
Published: (2008)
User authentication using neural network in smart home
by: Jee,, Tze Ling
Published: (2009)
by: Jee,, Tze Ling
Published: (2009)
A multifactor dimensionality reduction based associative classification for detecting SNP interactions
by: Uppu, S., et al.
Published: (2015)
by: Uppu, S., et al.
Published: (2015)
The effectiveness of multifactor leadership of headmaster perceived by teachers and parents / Mohamad Zain Bujang
by: Bujang, Mohamad Zain
Published: (2012)
by: Bujang, Mohamad Zain
Published: (2012)
A review of current trend on data management and quality in data communication
by: Sidi, Fatimah, et al.
Published: (2013)
by: Sidi, Fatimah, et al.
Published: (2013)
Factors influencing graphical user algorithm for mobile banking user authentication: a systematic literature review
by: Ugochukwu, Ejike Ekeke Kingsley, et al.
Published: (2014)
by: Ugochukwu, Ejike Ekeke Kingsley, et al.
Published: (2014)
Versioning approach for data warehouse schema
by: Mat Yusof, Sharmila, et al.
Published: (2019)
by: Mat Yusof, Sharmila, et al.
Published: (2019)
Behavioral Biometrics for User Authentication Using Self- Refreshing SOM
by: Teh, Chee Siong, et al.
Published: (2017)
by: Teh, Chee Siong, et al.
Published: (2017)
Application of Neural Network in User Authentication for Smart Home System
by: Joseph, A., et al.
Published: (2009)
by: Joseph, A., et al.
Published: (2009)
Knowledge discovery in unstructured, big data
by: Abu Muntalib, Shamsiah, et al.
Published: (2014)
by: Abu Muntalib, Shamsiah, et al.
Published: (2014)
Big data trend: knowledge discovery on the unstructured data
by: Abu Muntalib, Shamsiah, et al.
Published: (2014)
by: Abu Muntalib, Shamsiah, et al.
Published: (2014)
A cloud-based distributed platform for secured EPUB EBOOK contents
by: Faniband, Yunus Parvej, et al.
Published: (2020)
by: Faniband, Yunus Parvej, et al.
Published: (2020)
Data quality dimension in data warehouse
by: Sidi, Fatimah, et al.
Published: (2011)
by: Sidi, Fatimah, et al.
Published: (2011)
Exploring authentic food in Kelantan using mobile application / Muhamad Syafiq Aqim Sazeli
by: Sazeli, Muhamad Syafiq Aqim
Published: (2017)
by: Sazeli, Muhamad Syafiq Aqim
Published: (2017)
Application of the metabolomics approach in food authentication
by: Selamat, Jinap, et al.
Published: (2021)
by: Selamat, Jinap, et al.
Published: (2021)
Similar Items
-
Watermark blending technique for securing user authentication data in mobile application systems
by: Mohamed, Kartini, et al.
Published: (2019) -
Strengthening user authentication for better protection of mobile application systems
by: Mohamed, Kartini, et al.
Published: (2016) -
Protecting wireless data transmission in mobile application systems using digital watermarking technique
by: Mohamed, Kartini, et al.
Published: (2016) -
An improved user authentication model for mobile application systems
by: Mohamed, Kartini
Published: (2017) -
Character property method with biometric multifactor authentication for arabic text steganography
by: Roslan, Nuur Alifah
Published: (2018)