Integrating smartphone's intelligent techniques on authentication in mobile exam login process

Zhaozong Meng, Joan Lu, Ahlam Sawsaa

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

Abstract

The emerging build-in sensing techniques create opportunities for Human-Computer Interaction capability of the mobile devices. This investigation explores novel build-in sensing techniques and relevant computation intensive algorithms to enhance the operational efficiency and usability of mobile applications. A case study on mobile application authentication involving touch screen manual input, camera barcode scanning, NFC recognition is implemented. Qualitative and quantitative evaluations on usability, efficiency, stability, and accuracy of user operation are examined on mainstream mobile platforms. Result illustrates the advantage of the proposed scheme and verifies the feasibility to enhance user-mobile interaction with mobile sensing techniques.

Original languageEnglish
Title of host publicationComputational Collective Intelligence Technologies and Applications - 5th International Conference, ICCCI 2013, Proceedings
Pages130-142
Number of pages13
DOIs
Publication statusPublished - 1 Dec 2013
Event5th International Conference on Computational Collective Intelligence Technologies and Applications - Craiova, Romania
Duration: 11 Sep 201313 Sep 2013
Conference number: 5
http://software.ucv.ro/ICCCI2013/ (Link to Conference Website)

Publication series

NameLecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
Volume8083 LNAI
ISSN (Print)0302-9743
ISSN (Electronic)1611-3349

Conference

Conference5th International Conference on Computational Collective Intelligence Technologies and Applications
Abbreviated titleICCCI 2013
Country/TerritoryRomania
CityCraiova
Period11/09/1313/09/13
Internet address

Fingerprint

Dive into the research topics of 'Integrating smartphone's intelligent techniques on authentication in mobile exam login process'. Together they form a unique fingerprint.

Cite this