3 research outputs found

    A fractal-based authentication technique using sierpinski triangles in smart devices

    Get PDF
    © 2019 by the authors. Licensee MDPI, Basel, Switzerland. The prevalence of smart devices in our day-to-day activities increases the potential threat to our secret information. To counter these threats like unauthorized access and misuse of phones, only authorized users should be able to access the device. Authentication mechanism provide a secure way to safeguard the physical resources as well the information that is processed. Text-based passwords are the most common technique used for the authentication of devices, however, they are vulnerable to a certain type of attacks such as brute force, smudge and shoulder surfing attacks. Graphical Passwords (GPs) were introduced as an alternative for the conventional text-based authentication to overcome the potential threats. GPs use pictures and have been implemented in smart devices and workstations. Psychological studies reveal that humans can recognize images much easier and quicker than numeric and alphanumeric passwords, which become the basis for creating GPs. In this paper a novel Fractal-Based Authentication Technique (FBAT) has been proposed by implementing a Sierpinski triangle. In the FBAT scheme, the probability of password guessing is low making system resilient against abovementioned threats. Increasing fractal level makes the system stronger and provides security against attacks like shoulder surfing

    Investigating the Acceptance of Mobile Library Applications with an Extended Technology Acceptance Model (TAM)

    Get PDF
    © 2019 Mobile applications are getting a great deal of interest among researchers due to their proliferation and pervasiveness, especially in the context of digital libraries of educational institutes. However, their low acceptance and usage are observed, hence, in-depth investigations are required in order to understand the factors behind low acceptance and intention to use mobile library application (MLA). Therefore, the aim of this work is to empirically explore the acceptance of MLA with a proposed model that is evolved from the technology acceptance model (TAM). The study objects to deliver empirical provision on acceptance of MLA. A self-administrated cross-sectional survey-based study was conducted to gather data from 340 users of MLA. Structural equation model (SEM) with an analysis of moment structure (AMOS) software was conducted to examine quantitative data. Results revealed that perceived usefulness and perceived ease of use are direct significant predictors with the intention to use MLA whereas system quality and habit are the influencing factors toward the usage intention of MLA. The findings help as a guide for effective decision in the design and development of MLA. Further, the outcomes can be utilized in the resource allocation process for ensuring the success of the library's vision and mission
    corecore