Design and evaluation of new sensors-based smartphone authentication techniques
| Main Author: | Alrufaye, Moceheb Lazam Shuwandy |
|---|---|
| Format: | Thesis |
| Language: | English |
| Published: |
2019
|
| Online Access: | https://ir.upsi.edu.my/detailsg.php?det=6972 |
| Abstract | Abstract here |
Similar Items
Smile Mask Development of Cryptography Performance of MOLAZ Method (MOLAZ-SM)
by: Shuwandy, Moceheb Lazam
Published: (2012)
by: Shuwandy, Moceheb Lazam
Published: (2012)
User-Device Authentication Model With Digital Certificate For Smartphone User
by: Sakiinah binti Altaf Hussain
Published: (2024)
by: Sakiinah binti Altaf Hussain
Published: (2024)
Low fatigue walking-in-place locomotion technique for mobile VR using smartphone’s inertia sensors
by: Ang, Yang Yi
Published: (2020)
by: Ang, Yang Yi
Published: (2020)
Best- location technique for mammogram Authentication by LSB based watermarking
by: Cik Feresa Binti Mohd Foozy
Published: (2025)
by: Cik Feresa Binti Mohd Foozy
Published: (2025)
A new quantum authentication and key distribution protocol
by: Abdul Majeed, Mohammed Munther
Published: (2024)
by: Abdul Majeed, Mohammed Munther
Published: (2024)
Smartphone-based robot control for localisation
by: Nik Mahmod, Nik Firdaus
Published: (2015)
by: Nik Mahmod, Nik Firdaus
Published: (2015)
Improved message authentication technique on IEEE 802.15.4 wireless sensor network using multiple key protocol
by: Al-Alak, Saif M. Kh.
Published: (2014)
by: Al-Alak, Saif M. Kh.
Published: (2014)
Designing a detection method of cherenkov radiation using smartphone based cmos camera
by: Zamri, Muhammad Zaim Syamil Zamri
Published: (2020)
by: Zamri, Muhammad Zaim Syamil Zamri
Published: (2020)
Design and implementation of a pressure based typing biometric authentication system
by: Tahir, Wasil Elsadig
Published: (2024)
by: Tahir, Wasil Elsadig
Published: (2024)
Studio-based learning: the impact of smartphone apps for interior design students / Mohamed Nizam Abdul Aziz
by: Abdul Aziz, Mohamed Nizam
Published: (2020)
by: Abdul Aziz, Mohamed Nizam
Published: (2020)
A NEW TECHNIQUE OF STRETCHABLE CONDUCTIVE SENSOR DEVELOPMENT FOR SOFT ACTUATOR DEFORMATION APPLICATION
by: MOHD MUSTAPHA, NURUL HASYIMAH
Published: (2024)
by: MOHD MUSTAPHA, NURUL HASYIMAH
Published: (2024)
New framework for securing mobile adhoc network using lightweight authentication and signature-based intrusion detection system
by: Satria Mandala
Published: (2025)
by: Satria Mandala
Published: (2025)
An Investigation of Social Engineering Techniques towards Graphical Password Authentication
by: Naser Marwan Oshrok Laban
Published: (2024)
by: Naser Marwan Oshrok Laban
Published: (2024)
EEG-Based Person Authentication Modelling Using Incremental Fuzzy-Rough Nearest Neighbour Technique
by: Liew, Siaw Hong
Published: (2016)
by: Liew, Siaw Hong
Published: (2016)
Scientific forensic framework for smartphones
by: Shahpasand, Maryam
Published: (2015)
by: Shahpasand, Maryam
Published: (2015)
Multiple markers tracking technique as tracked handheld controller for smartphone virtual reality welding application
by: Muhammad Ismail Mat Isham
Published: (2025)
by: Muhammad Ismail Mat Isham
Published: (2025)
Design of a biometric authentication methodology using palmprint
by: Wong, Edward Kie Yih
Published: (2009)
by: Wong, Edward Kie Yih
Published: (2009)
Game based authentication for EDoS framework
by: Asaju Abdulazeez Olamilekan
Published: (2025)
by: Asaju Abdulazeez Olamilekan
Published: (2025)
An enhancement of authentication and energy efficient clustering protocol for wireless sensor network / Ahmed Abdulhadi Jasim
by: Ahmed Abdulhadi , Jasim
Published: (2021)
by: Ahmed Abdulhadi , Jasim
Published: (2021)
Enhancement of bluetooth security authentication using Hash-Based Message Authentication Code (HMAC) algorithm
by: Saliou, Diallo Alhassane
Published: (2024)
by: Saliou, Diallo Alhassane
Published: (2024)
A behaviour-based analytical malware detection framework for android smartphones
by: Damshenas, Mohsen
Published: (2014)
by: Damshenas, Mohsen
Published: (2014)
Students response system using smartphone for think-pair-share technique / Aainaa Hazwani Mohd Hashim
by: Mohd Hashim, Aainaa Hazwani
Published: (2017)
by: Mohd Hashim, Aainaa Hazwani
Published: (2017)
Framework for evaluating suitability of graphical user authentication for mobile banking
by: Kingsley Ugochukwu, Ejike Ekeke
Published: (2016)
by: Kingsley Ugochukwu, Ejike Ekeke
Published: (2016)
Smartphone blood vein detection system
by: Ahmed, Kazi Istiaque
Published: (2024)
by: Ahmed, Kazi Istiaque
Published: (2024)
Distraction descriptor for brainprint authentication modelling using probability-based incremental fuzzy-rough nearest neighbour technique
by: Liew, Siaw Hong
Published: (2021)
by: Liew, Siaw Hong
Published: (2021)
Evaluating Awareness Level Towards Smartphone Security Threats And Security Features Among Zawia University Students
by: Tahani. T. Ahmed. Hamoma
Published: (2024)
by: Tahani. T. Ahmed. Hamoma
Published: (2024)
Moderating effects of cross-cultural dimensions on the relationship between persuasive smartphone application's design and acceptance-loyalty
by: Faisal, Serri
Published: (2018)
by: Faisal, Serri
Published: (2018)
A multi-factor authentication scheme using attack recognition and key generator technique
by: Mohd Ariffin, Noor Afiza
Published: (2017)
by: Mohd Ariffin, Noor Afiza
Published: (2017)
Design of evaluation procedures for letter-based techniques in text ste ganography method
by: Utama, Sunariya
Published: (2017)
by: Utama, Sunariya
Published: (2017)
Design of robust and fragile image watermarking system for copyright protection and authentication using lifting wavelet transform and bivariate empirical mode decomposition techniques
by: Abbas, Nidaa Hasan
Published: (2017)
by: Abbas, Nidaa Hasan
Published: (2017)
Enhancement of Security Architecture for Smartcard Based Authentication Protocols
by: Mohammed, Lawan Ahmed
Published: (2004)
by: Mohammed, Lawan Ahmed
Published: (2004)
New power pinch analysis techniques for optimal design of hybrid power systems
by: Nor Erniza Mohammad Rozali
Published: (2025)
by: Nor Erniza Mohammad Rozali
Published: (2025)
A Novel Method For Secure Finger Vein Biometric during User Authentication Process Based On Blockchain-PSO-AES Techniques
by: Alkinani,Al Hadi Mohsin
Published: (2019)
by: Alkinani,Al Hadi Mohsin
Published: (2019)
Evaluation of authentication latency using predictive content transfer to support fast handover
by: Siti Norhaizum binti Mohamad Hasnan
Published: (2024)
by: Siti Norhaizum binti Mohamad Hasnan
Published: (2024)
Passwordless authentication protocol for mobile e-health network architecture using unique identity based technique / Nazhatul Hafizah Kamarudin
by: Kamarudin, Nazhatul Hafizah
Published: (2018)
by: Kamarudin, Nazhatul Hafizah
Published: (2018)
New Multiplexing Technique Based On Return-To-Zero Duty-Cycles
by: Abdalla Elhag, Mohamed Faisal
Published: (2007)
by: Abdalla Elhag, Mohamed Faisal
Published: (2007)
Acceptance and barriers to pharmacists adoption of smartphone medical apps
by: Ng, Sze Nee
Published: (2015)
by: Ng, Sze Nee
Published: (2015)
A generic smartphone forensic investigation process model
by: Farjamfar, Anahita
Published: (2016)
by: Farjamfar, Anahita
Published: (2016)
The adoption of smartphone in older adults / Nurul Amira Haron
by: Haron, Nurul Amira
Published: (2016)
by: Haron, Nurul Amira
Published: (2016)
The adoption of smartphone in older adults / Nurul Amira Haron
by: Haron, Nurul Amira
Published: (2016)
by: Haron, Nurul Amira
Published: (2016)
Similar Items
-
Smile Mask Development of Cryptography Performance of MOLAZ Method (MOLAZ-SM)
by: Shuwandy, Moceheb Lazam
Published: (2012) -
User-Device Authentication Model With Digital Certificate For Smartphone User
by: Sakiinah binti Altaf Hussain
Published: (2024) -
Low fatigue walking-in-place locomotion technique for mobile VR using smartphone’s inertia sensors
by: Ang, Yang Yi
Published: (2020) -
Best- location technique for mammogram Authentication by LSB based watermarking
by: Cik Feresa Binti Mohd Foozy
Published: (2025) -
A new quantum authentication and key distribution protocol
by: Abdul Majeed, Mohammed Munther
Published: (2024)