Documenti di Didattica
Documenti di Professioni
Documenti di Cultura
By Chris Hammond
1.
a. Mobile Devices, Security
b. Academic Search Premier
c. APA FORMAT:
Friedman, J., & Hoffman, D. V. (2008). Protecting data on mobile devices: A taxonomy of security threats to mobile
computing and review of applicable defenses. Information Knowledge Systems Management, 7(1/2), 159-180.
d. MLA FORMAT:
di Pietro, Roberto, and Luigi V. Mancini. "Security And Privacy Issues." Communications Of The ACM 46.9 (2003):
75-79. Academic Search Premier. Web. 18 Sept. 2015.
e.
2.
Title: Sensory brings mobile device security through combined voice and face
detection
Summary:
Instead of using either face or voice recognition to verify your identity, TrulySecure
uses both by using your camera to verify it is you, and then using your microphone
and allowing you to say a previously captured phrase, in order to unlock an app. You
can customize it to allow you to use one or the other for apps that require less
robust security, or requiring both to open up an app. Choosing to use one of the
methods makes it faster to access an app or data. Sensory also says that its
software is smart enough to see the difference between a person and a picture of a
person.
a. Tofel, Kevin. "Sensory Brings Mobile Device Security through Combined
Voice and Face Detection | ZDNet." ZDNet. Zdnet.com, 20 Aug. 2015.
Web. 18 Sept. 2015.
3.
1