Security, privacy, and usability in continuous authentication: A survey
AF Baig, S Eskeland - Sensors, 2021 - mdpi.com
Continuous authentication has been proposed as a possible approach for passive and
seamless user authentication, using sensor data comprising biometric, behavioral, and …
seamless user authentication, using sensor data comprising biometric, behavioral, and …
Continuous multimodal biometric authentication schemes: a systematic review
Building safeguards against illegitimate access and authentication is a cornerstone for
securing systems. Existing user authentication schemes suffer from challenges in detecting …
securing systems. Existing user authentication schemes suffer from challenges in detecting …
Sensor-based continuous authentication of smartphones' users using behavioral biometrics: A contemporary survey
Mobile devices and technologies have become increasingly popular, offering comparable
storage and computational capabilities to desktop computers allowing users to store and …
storage and computational capabilities to desktop computers allowing users to store and …
A survey on continuous authentication methods in Internet of Things environment
FH Al-Naji, R Zagrouba - Computer Communications, 2020 - Elsevier
IoT environment merges the digital and physical universes and enabling them to
communicate real-time data It is crucial to constantly ensure that the user is not …
communicate real-time data It is crucial to constantly ensure that the user is not …
Touch-based continuous mobile device authentication: State-of-the-art, challenges and opportunities
The advancement in the computational capability and storage size of a modern mobile
device has evolved it into a multi-purpose smart device for individual and business needs …
device has evolved it into a multi-purpose smart device for individual and business needs …
GaitCode: Gait-based continuous authentication using multimodal learning and wearable sensors
The ever-growing threats of security and privacy loss from unauthorized access to mobile
devices have led to the development of various biometric authentication methods for easier …
devices have led to the development of various biometric authentication methods for easier …
Leveraging user-related internet of things for continuous authentication: A survey
L Gonzalez-Manzano, JMD Fuentes… - ACM Computing Surveys …, 2019 - dl.acm.org
Among all Internet of Things (IoT) devices, a subset of them are related to users. Leveraging
these user-related IoT elements, it is possible to ensure the identity of the user for a period of …
these user-related IoT elements, it is possible to ensure the identity of the user for a period of …
The fall of one, the rise of many: a survey on multi-biometric fusion methods
LM Dinca, GP Hancke - IEEE Access, 2017 - ieeexplore.ieee.org
Increasing operational and security demands changed biometrics by shifting the focus from
single to multi-biometrics. Multi-biometrics are mandatory in the current context of large …
single to multi-biometrics. Multi-biometrics are mandatory in the current context of large …
Continuous authentication using biometrics: An advanced review
G Dahia, L Jesus… - … Reviews: Data Mining …, 2020 - Wiley Online Library
The shortcomings of conventional access control systems for high‐security environments
have led to the concert of continuous authentication. Contrary to traditional verification, in …
have led to the concert of continuous authentication. Contrary to traditional verification, in …
Gait-based continuous authentication using a novel sensor compensation algorithm and geometric features extracted from wearable sensors
S Lee, S Lee, E Park, J Lee, IY Kim - IEEE Access, 2022 - ieeexplore.ieee.org
With the rapid development of networking and computing technology, users can easily store
and interact with sensitive information on smart devices. Since smart devices are vulnerable …
and interact with sensitive information on smart devices. Since smart devices are vulnerable …