Mobile embedded system: Your door key evolved with your smartphone - A user evaluation of a two-factor authentication
dc.contributor.author | Teh, P. | |
dc.contributor.author | Ling, Huo Chong | |
dc.contributor.author | Cheong, S. | |
dc.contributor.author | Ahmed, P. | |
dc.date.accessioned | 2018-12-13T09:12:19Z | |
dc.date.available | 2018-12-13T09:12:19Z | |
dc.date.created | 2018-12-12T02:47:03Z | |
dc.date.issued | 2015 | |
dc.identifier.citation | Teh, P. and Ling, H.C. and Cheong, S. and Ahmed, P. 2015. Mobile embedded system: Your door key evolved with your smartphone - A user evaluation of a two-factor authentication. In Critical Socio-Technical Issues Surrounding Mobile Computing, 258-284. | |
dc.identifier.uri | http://hdl.handle.net/20.500.11937/72073 | |
dc.identifier.doi | 10.4018/978-1-4666-9438-5.ch013 | |
dc.description.abstract |
© 2016, IGI Global. The use of smartphone is pervasive. With device pocketability driving user engagement throughout the day, it is highly probable that smartphones will replace daily items (e.g., keys and credit cards) that people now carry around. The idea presented here is a significant step in this direction. This chapter details the authors' design and development of a smartphone access control system using Near Field Communication (NFC) Encrypted Steganography Graphical Password (ESGP). The primary objective is to leverage the technical capability of NFC-enabled smartphones in developing a two-factor authentication system connecting physical resources (i.e., premises) and virtual resources (i.e., password knowledge). This involves a novel integration of token-based, graphical-password authentication, cryptography and steganography. The second objective is to evaluate users' behavior intention to use the system. New insights for researchers and business world interested in the unified solutions for NFCcompatible smartphone, access control and mobile security are provided. | |
dc.title | Mobile embedded system: Your door key evolved with your smartphone - A user evaluation of a two-factor authentication | |
dc.type | Book Chapter | |
dcterms.source.startPage | 258 | |
dcterms.source.endPage | 284 | |
dcterms.source.title | Critical Socio-Technical Issues Surrounding Mobile Computing | |
dcterms.source.isbn | 9781466694392 | |
curtin.department | Curtin Malaysia | |
curtin.accessStatus | Fulltext not available |
Files in this item
Files | Size | Format | View |
---|---|---|---|
There are no files associated with this item. |