A study on cell phone security: Authentication techniques

Nooh Bany Muhammad

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

2 Scopus citations

Abstract

As technology advances, security breaches, hacks and intentional false positives increase. Therefore, security is a hot and imperative topic that every individual and organization must keep in mind as a high priority subject. This paper will discuss cell phone security, verification and authentication techniques, limitations of technologies of curbing the risks of these devices on us and the advances made in the provision of suitable solutions for these risks is the primary focus herein.

Original languageEnglish
Title of host publication2018 International Conference on Information and Computer Technologies, ICICT 2018
PublisherInstitute of Electrical and Electronics Engineers Inc.
Pages92-96
Number of pages5
ISBN (Electronic)9781538653845
DOIs
StatePublished - 9 May 2018
Event2018 International Conference on Information and Computer Technologies, ICICT 2018 - DeKalb, United States
Duration: 23 Mar 201825 Mar 2018

Publication series

Name2018 International Conference on Information and Computer Technologies, ICICT 2018

Conference

Conference2018 International Conference on Information and Computer Technologies, ICICT 2018
Country/TerritoryUnited States
CityDeKalb
Period23/03/1825/03/18

Keywords

  • authentication
  • biometrics
  • mobile phone
  • threats

Fingerprint

Dive into the research topics of 'A study on cell phone security: Authentication techniques'. Together they form a unique fingerprint.

Cite this