A systematic review of Bring Your Own Device (BYOD) authentication technique
This article provides a systematic review of Bring Your Own Device (BYOD) authentication technique. The review main goal is to identify the existing BYOD authentication technique and to categorize the technique according to BYOD security threat as well as to analyze the technique limitation. The rev...
| Main Authors: | Jamal, Fara, Abdullah@Selimun, Mohd. Taufik, Abdullah, Azizol, Mohd. Hanapi, Zurina |
|---|---|
| Format: | Article |
| Language: | English |
| Published: |
IOP Publishing
2020
|
| Online Access: | http://psasir.upm.edu.my/id/eprint/87730/ http://psasir.upm.edu.my/id/eprint/87730/1/ABSTRACT.pdf |
Similar Items
Enhanced Bring your Own Device (BYOD) environment security based on blockchain technology
by: Jamal, Fara, et al.
Published: (2018)
by: Jamal, Fara, et al.
Published: (2018)
Security attacks taxonomy on bring your own devices (BYOD) model
by: Singh, Manmeet Mahinderjit, et al.
Published: (2014)
by: Singh, Manmeet Mahinderjit, et al.
Published: (2014)
The Effect of Bring Your Own Device (BYOD) Adoption on Work Performance and Motivation
by: Doargajudhur, M., et al.
Published: (2018)
by: Doargajudhur, M., et al.
Published: (2018)
Bring your own device: security challenges and a theoretical framework for two-factor authentication
by: Olalere, Morufu, et al.
Published: (2016)
by: Olalere, Morufu, et al.
Published: (2016)
Network Administration System for Bring Your Own Device (BYOD) Over Software Defined Networking
by: Gooi, Hao Ming
Published: (2017)
by: Gooi, Hao Ming
Published: (2017)
A review of bring your own device on security issues
by: Olalere, Morufu, et al.
Published: (2015)
by: Olalere, Morufu, et al.
Published: (2015)
Towards BYOD: examining Education student readiness for a policy of Bring Your Own Digital device at ECU
by: Pagram, J., et al.
Published: (2013)
by: Pagram, J., et al.
Published: (2013)
Factors affecting acceptance of “Bring Your Own Device” (BYOD) policy at HeiTech Padu Berhad / Najuwa Aqilah Mohd Muslim
by: Mohd Muslim, Najuwa Aqilah
Published: (2018)
by: Mohd Muslim, Najuwa Aqilah
Published: (2018)
Bring your own digital device in teacher education
by: Newhouse, C., et al.
Published: (2015)
by: Newhouse, C., et al.
Published: (2015)
'Bring Your Own Device': Considering potential risks to student health
by: Merga, Margaret
Published: (2015)
by: Merga, Margaret
Published: (2015)
Access control framework in a bring your own device environment
by: Morufu, Olalere
Published: (2016)
by: Morufu, Olalere
Published: (2016)
A Bring-Your-Own-Device Framework over Software Defined Networking
by: Khoo, Wai Lung
Published: (2015)
by: Khoo, Wai Lung
Published: (2015)
Big data, cloud and "bring your own device": how the data protection law addresses the impact of 'datafication'
by: Zulhuda, Sonny, et al.
Published: (2015)
by: Zulhuda, Sonny, et al.
Published: (2015)
Individual – Organizational Bindpoints: A Design Theory for Bring-Your-Own-System
by: Baskerville, Richard, et al.
Published: (2013)
by: Baskerville, Richard, et al.
Published: (2013)
Effectiveness of blended active learning framework using Bring Your Own Device Learning (BYODL), Project Based Learning (PPBL) and Gamification Learning (GL)
by: Azana Hafizah Mohd Aman,, et al.
Published: (2021)
by: Azana Hafizah Mohd Aman,, et al.
Published: (2021)
Bringing learning to your doorstep
by: The Star
Published: (2018)
by: The Star
Published: (2018)
BYOD public system
by: Lee, Brenda Mun Yee
Published: (2015)
by: Lee, Brenda Mun Yee
Published: (2015)
Reliable access control for mobile cloud computing (MCC) with cache-aware scheduling
by: Jamal, Fara, et al.
Published: (2019)
by: Jamal, Fara, et al.
Published: (2019)
Secure multi-authority attribute-based encryption with cache-aware scheduling for mobile cloud access control
by: Jamal, Fara, et al.
Published: (2020)
by: Jamal, Fara, et al.
Published: (2020)
Make your own disinfectant
by: Goh, Choon Fu, et al.
Published: (2020)
by: Goh, Choon Fu, et al.
Published: (2020)
Ignore It At Your Own Risk
by: New Straits Times,
Published: (2008)
by: New Straits Times,
Published: (2008)
Make your own natural fertilisers
by: Md Jaafar, Noraini
Published: (2023)
by: Md Jaafar, Noraini
Published: (2023)
Do good with your life and bring happiness to others
by: UMP, PNC
Published: (2020)
by: UMP, PNC
Published: (2020)
Impact of BYOD on organizational commitment: an empirical investigation
by: Doargajudhur, M., et al.
Published: (2018)
by: Doargajudhur, M., et al.
Published: (2018)
Build your own social-networking site
Published: (2008)
Published: (2008)
Cut Costs Plant Your Own Vegetables
by: Sunday Star, Rashvinjeet S.Bedia
Published: (2008)
by: Sunday Star, Rashvinjeet S.Bedia
Published: (2008)
Kick-start your own community garden
by: Arif Shah, Jasmin
Published: (2023)
by: Arif Shah, Jasmin
Published: (2023)
QR-map: BYOD indoor map directory service.
by: Ang, Jenn Ning
Published: (2013)
by: Ang, Jenn Ning
Published: (2013)
Avoid making your own disinfectant, warns researcher
by: Asrol, Awang
Published: (2020)
by: Asrol, Awang
Published: (2020)
Draw a line on your PDA to authenticate
by: Liu, Xiyang, et al.
Published: (2010)
by: Liu, Xiyang, et al.
Published: (2010)
Use Your Own Device (UYOD) guidelines as a mechanism to enable sustainable mobile learning in a higher education institution
by: Igbrude, Claudia
Published: (2018)
by: Igbrude, Claudia
Published: (2018)
Mobile device-based authentic learning in educational environments systematic review
by: Mohamed, Abdul Latheef, et al.
Published: (2019)
by: Mohamed, Abdul Latheef, et al.
Published: (2019)
The health benefits and risks of growing-your-own produce in an urban environment
by: Stubberfield, Jonathan
Published: (2018)
by: Stubberfield, Jonathan
Published: (2018)
Psycho-geographical Choose Your Own Adventure: A city in the outermost west
by: Fyfe, A., et al.
Published: (2023)
by: Fyfe, A., et al.
Published: (2023)
Design and implementation of multi factor mechanism for secure authentication system
by: Hussein, Khalid Waleed, et al.
Published: (2013)
by: Hussein, Khalid Waleed, et al.
Published: (2013)
Review on user authentication on mobile devices
by: Abdul Gimba, Usman, et al.
Published: (2024)
by: Abdul Gimba, Usman, et al.
Published: (2024)
A novel authentication scheme to increase security for non-repudiation of users
by: Hussein, Khalid Waleed, et al.
Published: (2013)
by: Hussein, Khalid Waleed, et al.
Published: (2013)
A secured and efficient multi-factor biometric authentication scheme using plan recognition technique
by: Mohd Ariffin, Noor Afiza, et al.
Published: (2016)
by: Mohd Ariffin, Noor Afiza, et al.
Published: (2016)
Active authentication by one time password based on unique factor and behavioral biometric
by: Hussein, Khalid Waleed, et al.
Published: (2013)
by: Hussein, Khalid Waleed, et al.
Published: (2013)
“Find One of Your Own Kind”: Auto-ethnography and my Aboriginal Women Ancestors
by: Dowling, Carol Susan
Published: (2017)
by: Dowling, Carol Susan
Published: (2017)
Similar Items
-
Enhanced Bring your Own Device (BYOD) environment security based on blockchain technology
by: Jamal, Fara, et al.
Published: (2018) -
Security attacks taxonomy on bring your own devices (BYOD) model
by: Singh, Manmeet Mahinderjit, et al.
Published: (2014) -
The Effect of Bring Your Own Device (BYOD) Adoption on Work Performance and Motivation
by: Doargajudhur, M., et al.
Published: (2018) -
Bring your own device: security challenges and a theoretical framework for two-factor authentication
by: Olalere, Morufu, et al.
Published: (2016) -
Network Administration System for Bring Your Own Device (BYOD) Over Software Defined Networking
by: Gooi, Hao Ming
Published: (2017)