This paper has been written for a 6 ECTS course at the University of Twente in collaboration with Hugo Ideler and Paul Stapersma.

Due to the trend of increasing solid state memory and fast 3G and wireless data connections, mobile devices are increasingly used for storing, sending, and receiving sensitive information. With greater complexity on mobile devices comes greater risks for integrity and confidentiality. To cope with the increasing exposure to threats, many vendors and research papers are investigating new methods for authentication. We aggregated these methods in different categorizations.

Our goal is to specify, assess and compare different categories in alternate password entry methods for mobile devices. We review three different categories using one common set of requirements and we specify use cases to illustrate situational factors.

Download this paper.

Tagged with:

Leave a Reply

Your email address will not be published. Required fields are marked *