Advanced user authentication for mobile devices

NL Clarke, SM Furnell - computers & security, 2007 - Elsevier
… would be identified as such more often than not (even if notautomatically be supported.
The Hardware Compatibility … applications provided by the mobile device without hindrance. …

A multi-feature user authentication model based on mobile app interactions

Y Ashibani, QH Mahmoud - IEEE Access, 2020 - ieeexplore.ieee.org
user authentication and identification approach, utilizing app … insider user authentication and
identification has not received … in the application should be taken into account when having …

Behavioral biometrics & continuous user authentication on mobile devices: A survey

I Stylios, S Kokolakis, O Thanou, S Chatzis - Information Fusion, 2021 - Elsevier
… , these methods use the entry-point authentication model … model authenticated users based
on the Android applications… power consumption is not used as a single identifier on biometric …

[PDF][PDF] Method of secure App user authentication from auto-login in the mobile device

HJ Mun, YZ Li, K Jin - Indian Journal …, 2016 - sciresol.s3.us-east-2.amazonaws …
input the ID and PW with mobile devices is not easy so most of accounts are stored in the
auto-login … is the distinct identity number of Mobile Device (MD), in an invisible form into Service …

Au-id: Automatic user identification and authentication through the motions captured from sequential human activities using rfid

A Huang, D Wang, R Zhao, Q Zhang - … of the ACM on Interactive, Mobile …, 2019 - dl.acm.org
… , device-free user identification based on RFID has not been … the services for specific
users on account of the shared … In addition, to reduce overfitting, we apply dropout in the fully …

[图书][B] Mechanics of user identification and authentication: Fundamentals of identity management

D Todorov - 2007 - taylorfrancis.com
… to the author and do not necessarily coincide with the … authentication to any type of service
or application. Information that becomes specific to applications and then user authentication

[HTML][HTML] Personal information leaks with automatic login in mobile social network services

J Choi, H Cho, JH Yi - Entropy, 2015 - mdpi.com
… , if the user sets up the automatic login option on the app, a … -privileged apps such as Google
Account and Samsung Account … that the code for identification should not be stored on the …

Itus: an implicit authentication framework for android

H Khan, A Atwater, U Hengartner - Proceedings of the 20th annual …, 2014 - dl.acm.org
… tool for app developers to automatically determine appropriate … an app, we delegate IA tasks
to an app and not to the device. … Tips: Context-aware implicit user identification using touch …

Modern authentication schemes in smartphones and IoT devices: An empirical survey

MT Ahvanooey, MX Zhu, Q Li… - IEEE Internet of …, 2021 - ieeexplore.ieee.org
… ], without incorporating the applications of AS in IoT devices … to verify either the user identity
or the content authenticity of … simultaneously, ie, an automatic teller machine (ATM) card and …

Continuous authentication on mobile devices using power consumption, touch gestures and physical movement of users

R Murmuria, A Stavrou, D Barbará, D Fleck - Research in Attacks …, 2015 - Springer
User’s behavior is not similar across Chrome and Facebook applications and thus the
identification … Accurate online power estimation and automatic battery behavior based power …