Learn More
Mobile handsets have found an important place in modern society, with hundreds of millions currently in use. The majority of these devices use inherently weak authentication mechanisms, based upon passwords and PINs. This paper presents a feasibility study into a biometric-based technique, known as keystroke analysis – which authenticates the user based(More)
The potential advantages of behavioural biometrics are that they can be util-ised in a transparent (non-intrusive) and continuous authentication system. However, individual biometric techniques are not suited to all users and scenarios. One way to increase the reliability of transparent and continuous authenti-cation systems is create a multi-modal(More)
Providing a robust and reliable Intrusion Detection System (IDS) for Mobile Ad Hoc Network (MANET) is not as straightforward as in the wired networks because of the characteristics, threats and vulnerabilities, and security requirements related to such network. This paper discusses these issues along with a discussion of the existing research works that(More)
Mobile phones are now an accepted part of everyday life, with users becoming more reliant on the services that they can provide. In the vast majority of systems, the only security to prevent unauthorised use of the handset is a four digit Personal Identification Number (PIN). This paper presents the findings of a survey into the opinions of subscribers(More)