Author's method of securing the screen of the mobile device.
Article Sidebar
Open full text
Published:
Dec 30, 2018
Issue Vol. 9 (2018)
Articles
-
Security assessment of the selected mobile platform
Aleksandra Iwaniuk302-307
-
Author's method of securing the screen of the mobile device.
Grzegorz Iwaniuk308-310
-
Method of increasing the QR code capacity – Hexa QR Code
Daniel Janowski311-317
-
Comparative analysis of approches in developing Android applications using Xamarin technology
Michał Bartkiewicz, Adrian Dziedzic318-323
-
Quality evaluation of selected tools to automate application testing
Łukasz Szczepkowicz, Beata Pańczyk324-327
-
Comparative analysis of Front-End Code Playground tools
Mateusz Magier, Beata Pańczyk328-333
-
Comparison of selected tools to perform unit tests
Piotr Strzelecki, Maria Skublewska-Paszkowska334-339
-
Assessment of the web application security effectiveness against various methods of network attacks
Mateusz Erbel, Piotr Kopniak340-344
-
Method of synchronization and data processing from differents inertial sensors kits sources for the human gait analysis
Aleksandra Goźdź, Maciej Kalinowski, Piotr Kopniak345-349
-
Testing the functionality of the application made in .NET Core technology on the Raspberry Pi II platform
Tomasz Piotr Sajnóg, Dariusz Czerwiński350-358
Main Article Content
DOI
Authors
Grzegorz Iwaniuk
Institute of Computer Science, Lublin University of Technology, Nadbystrzycka 36B, 20-618 Lublin, Poland, Poland
Abstract
With the development of mobile device technology, the need to protect these devices from unauthorized access is increasing. Currently, there are common methods of unlocking devices whose operation consists in reading the pattern or the password entered by the user. The article presents the creation of an original method of screen protection of a mobile device and its comparison with commonly used screen locking methods.
Keywords:
Android; screen lock; security methods
References
[1] https://www.theverge.com/, [18-04-2018]
[2] https://www.droid-life.com, [01-05-2018]
[3] https://www.androidcentral.com, [18-04-2018]
[4] Wang K. Wang Y. Yan J. Zhang Y., Security Analysis and Vulnerability Detection of Gesture-based Lock in Android Applications, IEEE TrustCom-BigDataSetISPA, 2016.
[5] Iwaniuk A., Ocena zabezpieczeń wybranej platformy mobilnej, praca magisterska, Politechnika Lubelska, 2018.
[2] https://www.droid-life.com, [01-05-2018]
[3] https://www.androidcentral.com, [18-04-2018]
[4] Wang K. Wang Y. Yan J. Zhang Y., Security Analysis and Vulnerability Detection of Gesture-based Lock in Android Applications, IEEE TrustCom-BigDataSetISPA, 2016.
[5] Iwaniuk A., Ocena zabezpieczeń wybranej platformy mobilnej, praca magisterska, Politechnika Lubelska, 2018.
Article Details
Abstract views: 264
License

This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License.
