{"title":"NemoAuth:移动用户身份验证的助记多模态方法","authors":"Zhengyi Le, Xinwen Zhang, Zeyu Gao","doi":"10.1109/TENCON.2013.6719039","DOIUrl":null,"url":null,"abstract":"User authentication is always the first step of security services/mechanisms in computing infrastructures. However, mobile devices and clouds bring challenges and also new dimensions into this topic, such as limited computing power, migrating objects, and various embedded sensors. When a resource located either in a mobile device or in a cloud is requested, associated security policies will trigger authentication procedures for compliance enforcement. This paper proposes a new multimodal approach, called NemoAuth, to mobile device user authentication. It has unique mnemonic and other interesting benefits, and also improves both security and user experience which breaks the limit of recent user authentication technologies.","PeriodicalId":425023,"journal":{"name":"2013 IEEE International Conference of IEEE Region 10 (TENCON 2013)","volume":"18 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2013-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"5","resultStr":"{\"title\":\"NemoAuth: A mnemonic multimodal approach to mobile user authentication\",\"authors\":\"Zhengyi Le, Xinwen Zhang, Zeyu Gao\",\"doi\":\"10.1109/TENCON.2013.6719039\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"User authentication is always the first step of security services/mechanisms in computing infrastructures. However, mobile devices and clouds bring challenges and also new dimensions into this topic, such as limited computing power, migrating objects, and various embedded sensors. When a resource located either in a mobile device or in a cloud is requested, associated security policies will trigger authentication procedures for compliance enforcement. This paper proposes a new multimodal approach, called NemoAuth, to mobile device user authentication. It has unique mnemonic and other interesting benefits, and also improves both security and user experience which breaks the limit of recent user authentication technologies.\",\"PeriodicalId\":425023,\"journal\":{\"name\":\"2013 IEEE International Conference of IEEE Region 10 (TENCON 2013)\",\"volume\":\"18 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2013-10-01\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"5\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2013 IEEE International Conference of IEEE Region 10 (TENCON 2013)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/TENCON.2013.6719039\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2013 IEEE International Conference of IEEE Region 10 (TENCON 2013)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/TENCON.2013.6719039","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
NemoAuth: A mnemonic multimodal approach to mobile user authentication
User authentication is always the first step of security services/mechanisms in computing infrastructures. However, mobile devices and clouds bring challenges and also new dimensions into this topic, such as limited computing power, migrating objects, and various embedded sensors. When a resource located either in a mobile device or in a cloud is requested, associated security policies will trigger authentication procedures for compliance enforcement. This paper proposes a new multimodal approach, called NemoAuth, to mobile device user authentication. It has unique mnemonic and other interesting benefits, and also improves both security and user experience which breaks the limit of recent user authentication technologies.