Location-based authentication and authorization using smart phones

F Zhang, A Kondoro, S Muftic - … on trust, security and privacy in …, 2012 - ieeexplore.ieee.org
Authentication and authorization are two of the most important security features for mobile
transaction systems. Most commonly, these schemes depend on three factors: what you …

Google book search: Document understanding on a massive scale

L Vincent - … International Conference on Document Analysis and …, 2007 - ieeexplore.ieee.org
Unveiled in late 2004, Google Book Search is an ambitious program to make all the world's
books discoverable online. The sheer scale of the problem brings a number of unique …

Iot devices proximity authentication in ad hoc network environment

AAS AlQahtani, H Alamleh… - 2022 IEEE International …, 2022 - ieeexplore.ieee.org
Internet of Things (IoT) is a distributed communication technology system that offers the
possibility for physical devices (eg, vehicles, home appliances sensors, actuators, etc.) …

Obfuscation of sensitive human-perceptual output

AIA Wang, M Mitchell, P Reiher - US Patent 10,025,952, 2018 - Google Patents
The present invention includes a system and method for defending against unwanted
observations of the information conveyed by electronic devices. The system allows users to …

Comparative analysis of localization techniques used in lbs

M Kenan - 2021 5th International Conference on Computing …, 2021 - ieeexplore.ieee.org
In the past two decades, there has been rapid growth in the number of mobile devices. Most
of these mobile devices can sense different types of wireless signals (eg, GPS, Wi-Fi …

Location-based risk assessment for mobile authentication

D Hintze, E Koch, S Scholz, R Mayrhofer - Proceedings of the 2016 ACM …, 2016 - dl.acm.org
Mobile devices offer access to our digital lives and thus need to be protected against the risk
of unauthorized physical access by applying strong authentication, which in turn adversely …

Architecture for continuous authentication in location-based services

H Alamleh, AAS AlQahtani - 2020 International Conference on …, 2020 - ieeexplore.ieee.org
Location-based services are widely used today. The huge growth of location-based services
is enabled by the growth of the usage of mobile devices. Moreover, these devices can sense …

A survey in localization techniques used in location-based access control

MK Almutairi, S Bhattacharjee - 2021 IEEE World AI IoT …, 2021 - ieeexplore.ieee.org
There has been a huge growth in the number of mobile devices in the last few years. These
mobile devices are equipped with various hardware that allows them to sense and receive …

Defining and investigating device comfort

S Marsh, P Briggs, K El-Khatib, B Esfandiari… - Information and Media …, 2011 - jstage.jst.go.jp
Device Comfort is a concept that uses an enhanced notion of trust to allow a personal (likely
mobile) device to better reason about the state of interactions and actions between it, its …

Authdna: An adaptive authentication service for any identity server

H De Silva, DC Wittebron, AMR Lahiru… - … on Advancements in …, 2019 - ieeexplore.ieee.org
Adaptive authentication refers to the way that configures two factors or multi-factor
authentication, based on the user's risk profile. One of the most pressing concerns in modern …