14,301 Hits in 6.9 sec

Capturing commemoration: Using mobile recordings within memory research

Carolyn Birdsall, Danielle Drozdzewski
2017 Mobile Media & Communication  
It investigates the incorporation of audio and sound recording devices, observation, and note-taking into a mobile (auto)ethnographic research methodology, to research a large-scale commemorative event  ...  On May 4, 2016, the sounds of a Silent March-through the streets of Amsterdam to Dam Square-were recorded and complemented by video grabs of the march's participants and onlookers.  ...  Funding The author(s) received no financial support for the research, authorship, and/or publication of this article.  ... 
doi:10.1177/2050157917730587 pmid:29780585 pmcid:PMC5946655 fatcat:t3nxzei74vba5pcz5d3qgnsg7q

A Silent Password Recognition Framework based on Lip Analysis

Mohamed Ezz, Ayman Mohamed Mostafa, Abdurrahman A. Nasr
2020 IEEE Access  
A proposed silent password which is based on a dual security model for lip movement analysis will be a promoting solution to these attacks.  ...  He has contributed in more than 16 mega software projects in electronic banking EBPP, EMV, mobile banking, and e-commerce, also CBAP Certified.  ...  As a result, a biometric authentication scheme based on single and multi-server environment was presented for authenticating the key exchange process [13] .  ... 
doi:10.1109/access.2020.2982359 fatcat:5h6sevfvoza4ll6lgialsma4aq

Preserving location privacy in wireless lans

Tao Jiang, Helen J. Wang, Yih-Chun Hu
2007 Proceedings of the 5th international conference on Mobile systems, applications and services - MobiSys '07  
In this paper, we analyze the problem of location privacy in wireless networks and present a protocol for improving location privacy.  ...  We evaluated our system based on real-life mobility data and wireless LAN coverage. Our results show that a user of our system can be indistinguishable from a thousand users in the same coverage area.  ...  We would also like to thank our shepherd, David Wetherall, and the anonymous reviewers for their detailed suggestions and insightful comments.  ... 
doi:10.1145/1247660.1247689 dblp:conf/mobisys/JiangWH07 fatcat:4abc6crm2nhvtpo5xt5yx3vjke

Designing Touch-Based Hybrid Authentication Method for Smartphones

J. Nader, A. Alsadoon, P.W.C. Prasad, A.K. Singh, A. Elchouemi
2015 Procedia Computer Science  
This paper also proposes a hybrid authentication scheme comprises of continuous authentication (CA) and implicit authentication (IA) based on touch gestures.  ...  Biometric authentication consists of physiological and behavioural authentication.  ...  The implicit authentication is a one-time authentication while continuous authentication scheme continuously checks a user's identity in the background [4] .  ... 
doi:10.1016/j.procs.2015.10.072 fatcat:g3urzj3gwff2zfexu7vxp6xaji

Security and Privacy in Location-Based Services for Vehicular and Mobile Communications: An Overview, Challenges and Countermeasures

Philip Asuquo, Haitham Cruickshank, Jeremy Morley, Chibueze P. Anyigor Ogah, Ao Lei, Waleed Hathal, Shihan Bao, Zhili Sun
2018 IEEE Internet of Things Journal  
In this article, we analyse the security and privacy requirements for LBS in vehicular and mobile networks.  ...  Location-based Services (LBS) have gained popularity as a result of the advances in mobile and communication technologies. LBS provide users with relevant information based on their location.  ...  A decentralized lightweight authentication scheme TEAM (Trust-Extended Authentication Mechanism) is proposed by the authors in [92] for highly dynamic environments.  ... 
doi:10.1109/jiot.2018.2820039 fatcat:y2gdcllac5fbpdd2nnxn4tib2i

Evaluation of stability of swipe gesture authentication across usage scenarios of mobile device

Elakkiya Ellavarason, Richard Guest, Farzin Deravi
2020 EURASIP Journal on Information Security  
Literature reveals promising verification accuracy rates for swipe gesture authentication. Most of the existing studies have considered constrained environment in their experimental set-up.  ...  The results reveal that for a static user scenario, the average equal error rate is 1%, and it rises significantly for the scenarios involving any body movement-caused either by user or the environment  ...  based behavioural biometrics for continuous authentication (listed in Table 1 ).  ... 
doi:10.1186/s13635-020-00103-0 fatcat:qu4llh4ryrdlvc2cg2rkr3mb6y

Development of a Multifactor-Security-Protocol System Using Ambient Noise Synthesis

Agbotiname Imoize, Boluwatife Ben-Adeola, John Adebisi
2018 EAI Endorsed Transactions on Security and Safety  
Results achieved include algorithmic optimizations of existing local OTP protocol implementations, and the realization of a safe lock module, which interfaces with a mobile application developed on Android  ...  The system was deployed on an Arduino microcontroller embedded in a safe-cabinet secured with a 12V solenoid lock. The design was implemented and tested against standard metrics.  ...  Acknowledgements The authors acknowledge the University of Lagos for supporting this research work. A. L.  ... 
doi:10.4108/eai.13-7-2018.163979 fatcat:zcp5zfv4t5g6zgdohc72nvcry4

Influence of Mobile Agent Security in Distributed System

Kayode A.Akintoye, Samson B. Akintoye
2014 International Journal of Computer Applications  
So to protect the networks from attackers and the Intrusion detection technology becomes popular. There is tremendous rise in attacks on wired and wireless LAN.  ...  Roth & Jalali-Sohi in [13] presented a mobile agent structure which supports authentication, security management and access control for mobile agents.  ...  No Generic Building Methodology: In general, the cost of building IDS from available components is considerable, due in large part to the absence of a structured methodology.  ... 
doi:10.5120/15267-9760 fatcat:xz2yme3fhvbpfmmvu3nmdw27xm

Survivable mobile wireless networks

James P. G. Sterbenz, Rajesh Krishnan, Regina Rosales Hain, Alden W. Jackson, David Levin, Ram Ramanathan, John Zao
2002 Proceedings of the ACM workshop on Wireless security - WiSE '02  
In this paper we survey issues and challenges in enhancing the survivability of mobile wireless networks, with particular emphasis on military requirements * .  ...  (ii) design for endto-end communication in challenging environments in which the path from source to destination is not wholly available at any given instant of time, (iii) the use of technology to enhance  ...  In order to do so, continuous access to preconfigured infrastructure is assumed (for example foreign agents and home agents in mobile IP).  ... 
doi:10.1145/570681.570685 dblp:conf/ws/SterbenzKHJLRZ02 fatcat:xxdhvrmhpbaiffbrjdqskogqwi


Muhammad Shiraz, Laleh Boroumand, Abdullah Gani, Suleman Khan
2019 Malaysian Journal of Computer Science  
The latest developments in mobile cloud computing (MCC) have changed user's priorities for computing.  ...  This paper proposes a dynamic length port knocking authentication framework which addresses the issue of security degradation and optimizes performance in terms of time up and buffer managment.  ...  We deployed the proposed authentication method on the MikroTik RouterOs as a cloud gateway and used Autoit to program the mobile device as a port knocker.  ... 
doi:10.22452/mjcs.vol32no4.2 fatcat:ifggqjxcureu3m4uzcpfodcnze

Causality-based Sensemaking of Network Traffic for Android Application Security

Hao Zhang, Danfeng (Daphne) Yao, Naren Ramakrishnan
2016 Proceedings of the 2016 ACM Workshop on Artificial Intelligence and Security - ALSec '16  
The propound pledge device is a smart device which when activated, spoors the locality of the victim using GPS (Global Positioning System) and sends extremity messages using GSM (Global System for Mobile  ...  This paper advocates a smart gizmo for the safety of human especially women. According to neoteric reports, the Crime rate against women has increased twice the population growth rate in India.  ...  PROPOSED METHODOLOGY The proposed system is a portable device to help women in distress.  ... 
doi:10.1145/2996758.2996760 dblp:conf/ccs/0023YR16 fatcat:4cnx2bmqvrdlfjn7eeard2k36q

On Security Research Towards Future Mobile Network Generations [article]

David Rupprecht, Adrian Dabrowski, Thorsten Holz, Edgar Weippl, Christina Pöpper
2018 arXiv   pre-print
The problems of unsecured pre-authentication traffic and jamming attacks exist across all three mobile generations.  ...  To achieve this systematically, we develop a methodology that categorizes known attacks by their aim, proposed defenses, underlying causes, and root causes.  ...  Protocol properties are not harmful in a non-mobile network environment, but may be exploitable in a mobile environment if not adjusted properly. A.  ... 
arXiv:1710.08932v2 fatcat:jctgd5m46fanhiodzxafuujhey


Hassan Soleimani, Ali Asghar Rostami Abu Saeedi, Mahboubeh Rahmanian
2016 Novìtnâ Osvìta  
Yielding an economical learning opportunity along with providing authentic contexts for collaborative learning is beneficial for the economy of the country in general and for the meaningful and deep learning  ...  Mobile devices as the necessity of the new millennium need to use authentication software in their testing.  ...  Acknowledgments This study has been part of a grant-based project by Payame Noor University, Iran.  ... 
doi:10.20535/2410-8286.72703 fatcat:ij45mft7f5fqdfayqtshomizoe

Using mobile technology to facilitate formative assessment and support learning in apprenticeship programmes

Richie Ryan, Gina Noonan, Eddie McElheron
2018 Compass: Journal of Learning and Teaching  
Quizlet - one such technology, is a web-enabled mobile learning application that repurposes study-sets for use in any of its eight different quiz modes.  ...  , 2017).As students take more responsibility for their own learning, technology has a greater role to play in facilitating and supporting solutions that can provide more flexible learning opportunities  ...  Conclusions / further plans Quizlet engages students through a medium that appeals to their mobile nature and utilises proven educational methodologies to engage learners in a variety of competitive, collaborative  ... 
doi:10.21100/compass.v11i2.817 fatcat:agwuls7nenb5ni5gbd6kg2wtay

Adaptive Continuous Authentication System for Smartphones using Hyper Negative Selection and Random Forest Algorithms

Maryam M. Alharbi, Rashiq Rafiq Marie
2021 International Journal of Advanced Computer Science and Applications  
However, current continuous authentication models are limited due to dynamic changes in smartphone user behavior.  ...  This paper aims to enhance smartphone user privacy and security using continuous authentication based on touch dynamics by proposing a framework for smartphone devices based on user touch behavior to provide  ...  METHODOLOGY This paper builds a model for continuous authentication (CA) by applying the NSA on the dataset of [21] , [22] .  ... 
doi:10.14569/ijacsa.2021.0120859 fatcat:yun76kvwcnewzlrkxm2nv6rqu4
« Previous Showing results 1 — 15 out of 14,301 results