Security

A Model to Secure Mobile Devices Using Keystroke Dynamics Through Soft Computing Techniques

Download Now Free registration required

Executive Summary

In this mobile world, there are more mobile phones in than computers. Everyday more of these phones becomes smart phones. Nowadays, mobile devices functions like a mini computer, it becomes more attractive target for thieves. A reliable security application is needed to safeguard data and protect against theft. As mobile devices become more pervasive in the people lives, there is a greater need to protect the data on such devices. The current PIN (Personal Identification Number) authentication in mobile device is weak and there is a demand of strong authentication. Biometrics adds an additional authentication and it provides most significant improvement in mobile security.

  • Format: PDF
  • Size: 398.9 KB