Knock Knock: A Survey of iOS Authentication Methods

Almost all \"Interesting\" mobile applications don't exist in a vacuum. They rely on external systems for much of their data, and as such, frequently need a method for identifying and authenticating the application's user to the server. How this happens varies widely.

Provided by: SecurityTube.net Topic: Security Date Added: Feb 2015 Format: Webcast

Find By Topic