Abstract

The rapid development of smart phone devices and users' satisfaction with them, also have storage and accounting capabilities that compete with computers. Smart phones carry a lot of personal information and important financial information, so they are vulnerable to theft or access by unauthorized persons to that information. Increased need for ways to protect that information. Smartphones have several built-in sensors that facilitate the capture of biometrics and behavioral traits This paper reviews the authentication techniques for mobile, as it covers a comprehensive survey on authentication methods and comparison between these techniques.

Full Text
Published version (Free)

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call