A Model to Secure Mobile Devices Using Keystroke Dynamics Through Soft Computing Techniques

Provided by: International Journal of Soft Computing and Engineering (IJSCE)
Topic: Security
Format: PDF
In this mobile world, there are more mobile phones in than computers. Everyday more of these phones becomes smart phones. Nowadays, mobile devices functions like a mini computer, it becomes more attractive target for thieves. A reliable security application is needed to safeguard data and protect against theft. As mobile devices become more pervasive in the people lives, there is a greater need to protect the data on such devices. The current PIN (Personal Identification Number) authentication in mobile device is weak and there is a demand of strong authentication. Biometrics adds an additional authentication and it provides most significant improvement in mobile security.

Find By Topic