{"title":"手机安全研究:认证技术","authors":"Nooh Bany Muhammad","doi":"10.1109/INFOCT.2018.8356847","DOIUrl":null,"url":null,"abstract":"As technology advances, security breaches, hacks and intentional false positives increase. Therefore, security is a hot and imperative topic that every individual and organization must keep in mind as a high priority subject. This paper will discuss cell phone security, verification and authentication techniques, limitations of technologies of curbing the risks of these devices on us and the advances made in the provision of suitable solutions for these risks is the primary focus herein.","PeriodicalId":376443,"journal":{"name":"2018 International Conference on Information and Computer Technologies (ICICT)","volume":"10 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2018-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"1","resultStr":"{\"title\":\"A study on cell phone security: Authentication techniques\",\"authors\":\"Nooh Bany Muhammad\",\"doi\":\"10.1109/INFOCT.2018.8356847\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"As technology advances, security breaches, hacks and intentional false positives increase. Therefore, security is a hot and imperative topic that every individual and organization must keep in mind as a high priority subject. This paper will discuss cell phone security, verification and authentication techniques, limitations of technologies of curbing the risks of these devices on us and the advances made in the provision of suitable solutions for these risks is the primary focus herein.\",\"PeriodicalId\":376443,\"journal\":{\"name\":\"2018 International Conference on Information and Computer Technologies (ICICT)\",\"volume\":\"10 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2018-03-01\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"1\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2018 International Conference on Information and Computer Technologies (ICICT)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/INFOCT.2018.8356847\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2018 International Conference on Information and Computer Technologies (ICICT)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/INFOCT.2018.8356847","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
A study on cell phone security: Authentication techniques
As technology advances, security breaches, hacks and intentional false positives increase. Therefore, security is a hot and imperative topic that every individual and organization must keep in mind as a high priority subject. This paper will discuss cell phone security, verification and authentication techniques, limitations of technologies of curbing the risks of these devices on us and the advances made in the provision of suitable solutions for these risks is the primary focus herein.