Advanced user authentication for mobile devices
NL Clarke, SM Furnell - computers & security, 2007 - Elsevier
… would be identified as such more often than not (even if not … automatically be supported.
The Hardware Compatibility … applications provided by the mobile device without hindrance. …
The Hardware Compatibility … applications provided by the mobile device without hindrance. …
A multi-feature user authentication model based on mobile app interactions
Y Ashibani, QH Mahmoud - IEEE Access, 2020 - ieeexplore.ieee.org
… user authentication and identification approach, utilizing app … insider user authentication and
identification has not received … in the application should be taken into account when having …
identification has not received … in the application should be taken into account when having …
Behavioral biometrics & continuous user authentication on mobile devices: A survey
… , these methods use the entry-point authentication model … model authenticated users based
on the Android applications… power consumption is not used as a single identifier on biometric …
on the Android applications… power consumption is not used as a single identifier on biometric …
[PDF][PDF] Method of secure App user authentication from auto-login in the mobile device
HJ Mun, YZ Li, K Jin - Indian Journal …, 2016 - sciresol.s3.us-east-2.amazonaws …
… input the ID and PW with mobile devices is not easy so most of accounts are stored in the
auto-login … is the distinct identity number of Mobile Device (MD), in an invisible form into Service …
auto-login … is the distinct identity number of Mobile Device (MD), in an invisible form into Service …
Au-id: Automatic user identification and authentication through the motions captured from sequential human activities using rfid
… , device-free user identification based on RFID has not been … the services for specific
users on account of the shared … In addition, to reduce overfitting, we apply dropout in the fully …
users on account of the shared … In addition, to reduce overfitting, we apply dropout in the fully …
[图书][B] Mechanics of user identification and authentication: Fundamentals of identity management
D Todorov - 2007 - taylorfrancis.com
… to the author and do not necessarily coincide with the … authentication to any type of service
or application. Information that becomes specific to applications and then user authentication …
or application. Information that becomes specific to applications and then user authentication …
[HTML][HTML] Personal information leaks with automatic login in mobile social network services
… , if the user sets up the automatic login option on the app, a … -privileged apps such as Google
Account and Samsung Account … that the code for identification should not be stored on the …
Account and Samsung Account … that the code for identification should not be stored on the …
Itus: an implicit authentication framework for android
… tool for app developers to automatically determine appropriate … an app, we delegate IA tasks
to an app and not to the device. … Tips: Context-aware implicit user identification using touch …
to an app and not to the device. … Tips: Context-aware implicit user identification using touch …
Modern authentication schemes in smartphones and IoT devices: An empirical survey
… ], without incorporating the applications of AS in IoT devices … to verify either the user identity
or the content authenticity of … simultaneously, ie, an automatic teller machine (ATM) card and …
or the content authenticity of … simultaneously, ie, an automatic teller machine (ATM) card and …
Continuous authentication on mobile devices using power consumption, touch gestures and physical movement of users
… User’s behavior is not similar across Chrome and Facebook applications and thus the
identification … Accurate online power estimation and automatic battery behavior based power …
identification … Accurate online power estimation and automatic battery behavior based power …