A critical insight into the identity authentication systems on smartphones
The advancement of computing power on mobile devices and their popularity among people in performing sensitive data exchange is uncovering an urgent need for a highly secure solution than the existing ones. The need for such a security solution persists that should be able to thwart not only the con...
Saved in:
Main Authors: | Mehraj, Tehseen (Author), Aman Sheheryar, Mir (Author), Ahmed Lone, Sajaad (Author), Mir, A. H. (Author) |
---|---|
Format: | EJournal Article |
Published: |
Institute of Advanced Engineering and Science,
2019-03-01.
|
Subjects: | |
Online Access: | Get fulltext |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
Similar Items
-
PHENOMENA OF TURN-TAKING SYSTEM IN MENTORING ACTIVITY
by: Nisa, Mir Atun
Published: (2018) -
Multilevel Authentication for Social Network
by: Zhia Sheng, Dalian Wu, et al.
Published: (2018) -
Under Construction : Performing Critical Identity
Published: (2021) -
Evaluation of Power Minimization for Routing Protocol and Multicast Networks
by: mir, Shabir Ahmed, et al.
Published: (2018) -
Review About Various Satellite Image Segmentation
by: Mir, Shabir Ahmed, et al.
Published: (2018)