Monday, March 13, 2017

Exploring Mobile Authentication Mechanisms from Personal Identification Numbers to Biometrics

This chapter from Protecting Mobile Networks and Devices highlights the strength and the weakness of the current authentication schemes, from the simpler ones such as personal identification number to the more complex biometric systems such as fingerprints. The authors evaluate the usability of these schemes for the user based on both existing and new criteria.