Comparison of the NFC authentication method with the methods available in Android
Article Sidebar
Open full text
Issue Vol. 15 (2020)
-
Neural networks in recognition of handwriting
Bernadetta Michalik, Marek Miłosz109-113
-
Influence the quality of the interface of online stores on their memorability
Katarzyna Pytka, Marek Miłosz114-120
-
Comparison of the NFC authentication method with the methods available in Android
Dmytro Malenko121-125
-
Comparative analysis of database systems dedicated for Android
Kamil Wałachowski, Grzegorz Kozieł126-132
-
Digital services in Poland and the Far East - comparative analysis
Dominik Klej133-138
-
Modern technologies for creating graphical user interface in web applications
Mateusz Kaproń, Beata Pańczyk139-142
-
Verification of the precision of GSM and GPS signals available on mobile devices
Mateusz Wlaź, Grzegorz Kozieł143-149
-
Corporate intranet platform – open and commercial solutions comparison
Konrad Czarny150-155
-
Comparative analysis of solutions used in automated testing
Agnieszka Dorota Wac, Tomasz Kamil Watras, Grzegorz Kozieł156-163
-
Analysis of the vulnerability of IT system users to a phishing attack
Szymon Grzebielec164-167
-
Contactless interfaces in virtual reality
Andriy Dragni, Tomasz Szymczyk168-171
-
The system using mobile technologies to test reaction time
Michał Woś, Artur Zdzioch172-177
-
Comparative analysis of a selected version of the Symfony framework
Michał Jusięga, Mariusz Dzieńkowski178-183
-
Containerization methods in internet service applications
Krzysztof Ferenc184-188
-
Performance analysis of languages working on Java Virtual Machine based on Java, Scala and Kotlin
Katarzyna Buszewicz189-195
-
The "Quizer" e-learning platform as a tool for creating interactive quizzes with multiplayer functionality
Krzysztof Dziedzic, Marek Gudków, Tomasz Wiśniewski196-201
-
Analysis of typical programming mistakes made by first and second year IT students
Monika Kaczorowska202-205
-
Object classification using X-ray images
Piotr Nowosad, Małgorzata Charytanowicz206-213
-
Semi-supervised learning with the clustering and Decision Trees classifier for the task of cognitive workload study
Martyna Wawrzyk214-218
Main Article Content
DOI
Authors
Abstract
Most multi-user applications need an access system so that users can log in from different devices. To identify a user, at least one authentication method must be used. The article presents a comparison of the authentication method using NFC technology with other methods that are available for Android devices and differ in both implementation and specific usage.
Keywords:
References
http://www.androidauthority.com/what-is-nfc-270730/ [30.06.2019]
http://www.arstechnica.com/features/2018/01/a-practical-guide-to-microchip-implants/oggle.it [01.03.2018]
http://www.patents.google.com/patent/US8831514B2/en [09.09.2014]
http://www.patents.google.com/patent/US20140266624A1/en [18.09.2014]
http://www.ieeexplore.ieee.org/abstract/document/6449282 [04.02.2013]
http://www.ieeexplore.ieee.org/abstract/document/6470914 [11.03.2013]
http://www.patents.google.com/patent/US9276643B2/en [01.03.2016]
http://www.sciencedirect.com/science/article/pii/S0167923613002509 [01.03.2014]
http://www.patents.google.com/patent/US8478196B1/en [02.07.2013]
http://www.ieeexplore.ieee.org/abstract/document/7568941 [15.09.2016]
http://www.ieeexplore.ieee.org/abstract/document/7153937 [13.07.2015]
http://www.ieeexplore.ieee.org/abstract/document/6698315 [06.01.2014]
http://www.ieeexplore.ieee.org/abstract/document/6578295 [16.08.2013]
http://www.medium.com/google-developer-experts/exploring-the-v28-android-design-support-library-2c96c6031ae8 [19.03.2018]
Article Details
Abstract views: 419
License

This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License.
