@inproceedings{ae85d739df034d198948122eac4836bb,
title = "A study on cell phone security: Authentication techniques",
abstract = "As technology advances, security breaches, hacks and intentional false positives increase. Therefore, security is a hot and imperative topic that every individual and organization must keep in mind as a high priority subject. This paper will discuss cell phone security, verification and authentication techniques, limitations of technologies of curbing the risks of these devices on us and the advances made in the provision of suitable solutions for these risks is the primary focus herein.",
keywords = "authentication, biometrics, mobile phone, threats",
author = "Muhammad, {Nooh Bany}",
note = "Publisher Copyright: {\textcopyright} 2018 IEEE.; 2018 International Conference on Information and Computer Technologies, ICICT 2018 ; Conference date: 23-03-2018 Through 25-03-2018",
year = "2018",
month = may,
day = "9",
doi = "10.1109/INFOCT.2018.8356847",
language = "English",
series = "2018 International Conference on Information and Computer Technologies, ICICT 2018",
publisher = "Institute of Electrical and Electronics Engineers Inc.",
pages = "92--96",
booktitle = "2018 International Conference on Information and Computer Technologies, ICICT 2018",
address = "United States",
}