Computing Reviews
Today's Issue Hot Topics Search Browse Recommended My Account Log In
Review Help
Search
Secure and usable authentication on mobile devices
Schlöglhofer R., Sametinger J.  MoMM 2012 (Proceedings of the 10th International Conference on Advances in Mobile Computing & Multimedia, Bali, Indonesia, Dec 3-5, 2012)257-262.2012.Type:Proceedings
Date Reviewed: Mar 15 2013

SecureLock, an authentication mechanism for Android-based devices, is proposed and compared with existing solutions in this paper. It is a replacement for the Android lock screen and provides four methods of authentication: PIN, password, near-field communication (with appropriate hardware), and gesture puzzles, a knowledge-based authentication method. SecureLock is compared with other Android tools, in terms of user perceptions.

Usability is also considered: how many “things” does the user have to remember? Can the graphical knowledge algorithm proposed by SecureLock help security? Is graphical knowledge better than using a virtual keyboard? The authors highlight that passwords are usually weak, because the combination of capital letters and numbers may be cumbersome on some devices.

The problem is worthy of attention. The security of mobile devices is important, now that they are used so much more often for sharing personal information. SecureLock can better protect the identity of a person by avoiding certain types of attacks; however, it does not necessarily elevate trust for already-authenticated users. SecureLock considers the user session immutable up to a new screen lock (as the implementation section suggests). Therefore, a way to continuously identify the user for applications that manage high-profile private data would be a major benefit of the application.

Reviewer:  Massimiliano Masi Review #: CR141025 (1306-0525)
Bookmark and Share
  Reviewer Selected
Featured Reviewer
 
 
Authentication (D.4.6 ... )
 
 
Access Controls (D.4.6 ... )
 
 
Portable Devices (C.5.3 ... )
 
 
General (D.2.0 )
 
 
Miscellaneous (H.4.m )
 
Would you recommend this review?
yes
no
Other reviews under "Authentication": Date
Showing credentials without identification: transferring signatures between unconditionally unlinkable pseudonyms
Chaum D. (ed)  Advances in cryptology (, Sydney, Australia, Jan 8-11, 1990)2641990. Type: Proceedings
Jan 1 1992
Some constructions and bounds for authentication codes
Stinson D.  Advances in cryptology--CRYPTO ’86 (, Santa Barbara, CA, Aug 11-15, 1987)4251987. Type: Proceedings
Sep 1 1988
A pauper’s callback scheme
Bishop M. Computers and Security 5(2): 141-144, 1986. Type: Article
Mar 1 1987
more...

E-Mail This Printer-Friendly
Send Your Comments
Contact Us
Reproduction in whole or in part without permission is prohibited.   Copyright 1999-2024 ThinkLoud®
Terms of Use
| Privacy Policy