{"title":"Leveraging contextual data for multifactor authentication in the mobile web","authors":"G. Mandyam, Mike Milikich","doi":"10.1109/COMSNETS.2015.7098728","DOIUrl":null,"url":null,"abstract":"Identify and authentication in the mobile web are important for many types of applications that benefit users, including payments. The mobile web today has several traditional approaches to authentication that allow for sensitive applications to take place. However, moving forward the use of contextual data can have a place in the area of authentication, Use of sensor information available on smartphones can provide information about user context that can serve either to augment existing authentication techniques or even provide additional authentication factors in their own right.","PeriodicalId":277593,"journal":{"name":"2015 7th International Conference on Communication Systems and Networks (COMSNETS)","volume":"152 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2015-05-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2015 7th International Conference on Communication Systems and Networks (COMSNETS)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/COMSNETS.2015.7098728","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 0
Abstract
Identify and authentication in the mobile web are important for many types of applications that benefit users, including payments. The mobile web today has several traditional approaches to authentication that allow for sensitive applications to take place. However, moving forward the use of contextual data can have a place in the area of authentication, Use of sensor information available on smartphones can provide information about user context that can serve either to augment existing authentication techniques or even provide additional authentication factors in their own right.