Добірка наукової літератури з теми "Android Keystore"
Оформте джерело за APA, MLA, Chicago, Harvard та іншими стилями
Ознайомтеся зі списками актуальних статей, книг, дисертацій, тез та інших наукових джерел на тему "Android Keystore".
Біля кожної праці в переліку літератури доступна кнопка «Додати до бібліографії». Скористайтеся нею – і ми автоматично оформимо бібліографічне посилання на обрану працю в потрібному вам стилі цитування: APA, MLA, «Гарвард», «Чикаго», «Ванкувер» тощо.
Також ви можете завантажити повний текст наукової публікації у форматі «.pdf» та прочитати онлайн анотацію до роботи, якщо відповідні параметри наявні в метаданих.
Статті в журналах з теми "Android Keystore"
Huang, Wen Da. "Remote Monitoring of Environment by Android Smartphone through Secure Sockets Layer." Applied Mechanics and Materials 522-524 (February 2014): 80–83. http://dx.doi.org/10.4028/www.scientific.net/amm.522-524.80.
Повний текст джерелаAntal, Margit, László Zsolt Szabó, and Izabella László. "Keystroke Dynamics on Android Platform." Procedia Technology 19 (2015): 820–26. http://dx.doi.org/10.1016/j.protcy.2015.02.118.
Повний текст джерелаZhang, Bao Long, Wei Qi Ding, Shao Jing Zhang, and Hui Shuang Shi. "Realization of Automatic Keystone Correction for Smart Mini Projector Projection Screen." Applied Mechanics and Materials 519-520 (February 2014): 504–9. http://dx.doi.org/10.4028/www.scientific.net/amm.519-520.504.
Повний текст джерелаSonawane, Miss Aarti Raman, and Prof Kumbhar H. V. "Graphical-Based Password Keystroke Dynamic Authentication System for Android Phone." IJARCCE 5, no. 12 (December 30, 2016): 377–81. http://dx.doi.org/10.17148/ijarcce.2016.51287.
Повний текст джерелаPirzado, Farman, Shahzad Memon, Lachman Das Dhomeja Dhomeja, and Awais Ahmed. "Keystroke dynamics Based Technique to Enhance the Security in Smart Devices." KIET Journal of Computing and Information Sciences 4, no. 1 (January 1, 2021): 14. http://dx.doi.org/10.51153/kjcis.v4i1.61.
Повний текст джерелаM., Prajakta, Lillita Rhea, Chaitrali Gandhi, and Naman Malik. "The Influence of Emotions on Keystroke Patterns in Android Platform using Auditory Stimuli - An Experimental Study." International Journal of Computer Applications 170, no. 7 (July 17, 2017): 16–19. http://dx.doi.org/10.5120/ijca2017914916.
Повний текст джерелаCaro-Alvaro, Sergio, Eva Garcia-Lopez, Antonio Garcia-Cabot, Luis de-Marcos, and Jose-Javier Martinez-Herraiz. "Identifying Usability Issues in Instant Messaging Apps on iOS and Android Platforms." Mobile Information Systems 2018 (October 10, 2018): 1–19. http://dx.doi.org/10.1155/2018/2056290.
Повний текст джерелаAlsuhibany, Suliman A., and Afnan S. Almuqbil. "Analyzing the Effectiveness of Touch Keystroke Dynamic Authentication for the Arabic Language." Wireless Communications and Mobile Computing 2021 (September 10, 2021): 1–15. http://dx.doi.org/10.1155/2021/9963129.
Повний текст джерелаStylios, Ioannis, Spyros Kokolakis, Andreas Skalkos, and Sotirios Chatzis. "BioGames: a new paradigm and a behavioral biometrics collection tool for research purposes." Information & Computer Security 30, no. 2 (December 7, 2021): 243–54. http://dx.doi.org/10.1108/ics-12-2020-0196.
Повний текст джерела"Keystroke-based biometric authentication in mobile applications." International Journal of Software Innovation 10, no. 1 (January 2022): 0. http://dx.doi.org/10.4018/ijsi.303574.
Повний текст джерелаДисертації з теми "Android Keystore"
Sabt, Mohamed. "Outsmarting smartphones : trust based on provable security and hardware primitives in smartphones architectures." Thesis, Compiègne, 2016. http://www.theses.fr/2016COMP2320.
Повний текст джерелаThe landscape of mobile devices has been changed with the introduction of smartphones. Sincetheir advent, smartphones have become almost vital in the modern world. This has spurred many service providers to propose access to their services via mobile applications. Despite such big success, the use of smartphones for sensitive applications has not become widely popular. The reason behind this is that users, being increasingly aware about security, do not trust their smartphones to protect sensitive applications from attackers. The goal of this thesis is to strengthen users trust in their devices. We cover this trust problem with two complementary approaches: provable security and hardware primitives. In the first part, our goal is to demonstrate the limits of the existing technologies in smartphones architectures. To this end, we analyze two widely deployed systems in which careful design was applied in order to enforce their security guarantee: the Android KeyStore, which is the component shielding users cryptographic keys in Android smartphones, and the family of Secure Channel Protocols (SCPs) defined by the GlobalPlatform consortium. Our study relies on the paradigm of provable security. Despite being perceived as rather theoretical and abstract, we show that this tool can be handily used for real-world systems to find security vulnerabilities. This shows the important role that can play provable security for trust by being able to formally prove the absence of security flaws or to identify them if they exist. The second part focuses on complex systems that cannot cost-effectively be formally verified. We begin by investigating the dual-execution-environment approach. Then, we consider the case when this approach is built upon some particular hardware primitives, namely the ARM TrustZone, to construct the so-called Trusted Execution Environment (TEE). Finally, we explore two solutions addressing some of the TEE limitations. First, we propose a new TEE architecture that protects its sensitive data even when the secure kernel gets compromised. This relieves service providers of fully trusting the TEE issuer. Second, we provide a solution in which TEE is used not only for execution protection, but also to guarantee more elaborated security properties (i.e. self-protection and self-healing) to a complex software system like an OS kernel
Lin, Jyun-Hao, and 林俊豪. "Keystroke Dynamic PIN-based and Graphical-based Authentication System - Implemented in Android Compatible Phone." Thesis, 2011. http://ndltd.ncl.edu.tw/handle/67258930883548991161.
Повний текст джерела國立彰化師範大學
數位學習研究所
99
Since the touch screen handheld mobile devices have become widely used, people are able to conveniently access various data and information anywhere. Most user authentication methods for these mobile devices are PIN-based (Person Identification Number) authentication. However, PINs consist of 4 to 8 numbers and then it suffers from guessing and shoulder surfing attacks easily. Many studies have employed the KDA (Keystroke Dynamics-based Authentication) system, which verifies PIN correctness and also verifies the corresponding individual keystroke features. It provides additional security verification for PIN-based authentication. Unfortunately, unlike the text-based password KDA systems in QWERTY keyboards, different keypad sizes or layouts of mobile devices affect the PIN-based KDA system utility. In this study, the accuracy of authenticating the keystroke features are not affected by inconsistent keypads since the PINs is entered via the identical size of human-computer interface. Moreover, except for the original keystroke time features in the KDA systems, two novel keystroke features are found in touch screen handheld mobile devices, which are called "pressure" features and "size" features. This study uses these features to improve the keystroke data quality of PIN-based KDA system. On the other hand, we propose a new graphical-based password KDA system for touch screen handheld mobile devices. The proposed system uses graphical password to enlarge the password space size and uses the pressure features to improve the keystroke data quality. A user also enter his/her graphical password via the identical size of human-computer interface. Under this situation, the graphical-based password KDA system is able to promote the PIN-based KDA system utility in touch screen handheld mobile devices.
Частини книг з теми "Android Keystore"
Sabt, Mohamed, and Jacques Traorè. "Breaking into the KeyStore: A Practical Forgery Attack Against Android KeyStore." In Computer Security – ESORICS 2016, 531–48. Cham: Springer International Publishing, 2016. http://dx.doi.org/10.1007/978-3-319-45741-3_27.
Повний текст джерелаTheofilou, Savvas, Nikolas Vardas, and Christos Katsanos. "FLM-2A: Towards Automated HCI Modeling of Android Applications Based on a Modified Version of the Keystroke Level Model." In Human-Computer Interaction. Theory, Methods and Tools, 329–42. Cham: Springer International Publishing, 2021. http://dx.doi.org/10.1007/978-3-030-78462-1_25.
Повний текст джерелаТези доповідей конференцій з теми "Android Keystore"
El Zein, Dima, and Ali Kalakech. "Feature Selection for Android Keystroke Dynamics." In 2018 International Arab Conference on Information Technology (ACIT). IEEE, 2018. http://dx.doi.org/10.1109/acit.2018.8672706.
Повний текст джерелаElmiligi, Haytham, and Sherif Saad. "iProfile: Collecting and Analyzing Keystroke Dynamics from Android Users." In 8th International Conference on Information Systems Security and Privacy. SCITEPRESS - Science and Technology Publications, 2022. http://dx.doi.org/10.5220/0011002600003120.
Повний текст джерелаPutri, Alifa Nurani, Yudistira Dwi Wardhana Asnar, and Saiful Akbar. "A continuous fusion authentication for Android based on keystroke dynamics and touch gesture." In 2016 International Conference on Data and Software Engineering (ICoDSE). IEEE, 2016. http://dx.doi.org/10.1109/icodse.2016.7936146.
Повний текст джерелаNasution, Surya Michrandi, Yudha Purwanto, Agus Virgono, and M. Faris Ruriawan. "Modified kleptodata for spying soft-input keystroke and location based on Android mobile device." In 2015 International Conference on Information Technology Systems and Innovation (ICITSI). IEEE, 2015. http://dx.doi.org/10.1109/icitsi.2015.7437700.
Повний текст джерелаBenjapatanamongkol, Nareerat, and Pattarasinee Bhattarakosol. "A Preliminary Study of Finger Area and Keystroke Dynamics Using Numeric Keypad With Random Numbers on Android Phones." In 2019 23rd International Computer Science and Engineering Conference (ICSEC). IEEE, 2019. http://dx.doi.org/10.1109/icsec47112.2019.8974686.
Повний текст джерелаGautam, Prakash, and Pankaj Raj Dawadi. "Keystroke biometric system for touch screen text input on android devices optimization of equal error rate based on medians vector proximity." In 2017 11th International Conference on Software, Knowledge, Information Management and Applications (SKIMA). IEEE, 2017. http://dx.doi.org/10.1109/skima.2017.8294136.
Повний текст джерела