Surveying the development of biometric user authentication on mobile phones

W Meng, DS Wong, S Furnell… - … Surveys & Tutorials, 2014 - ieeexplore.ieee.org
Designing reliable user authentication on mobile phones is becoming an increasingly
important task to protect users' private information and data. Since biometric approaches can …

Authentication of smartphone users using behavioral biometrics

A Alzubaidi, J Kalita - IEEE Communications Surveys & …, 2016 - ieeexplore.ieee.org
Smartphones and tablets have become ubiquitous in our daily lives. Smartphones, in
particular, have become more than personal assistants. These devices have provided new …

Passwords and the evolution of imperfect authentication

J Bonneau, C Herley, PC Van Oorschot… - Communications of the …, 2015 - dl.acm.org
Passwords and the evolution of imperfect authentication Page 1 78 COMMUNICATIONS OF
THE ACM | JULY 2015 | VOL. 58 | NO. 7 contributed articles DOI:10.1145/2699390 Theory on …

{It's} a hard lock life: A field study of smartphone ({Un) Locking} behavior and risk perception

M Harbach, E Von Zezschwitz, A Fichtner… - 10th symposium on …, 2014 - usenix.org
A lot of research is being conducted into improving the usability and security of phone-
unlocking. There is however a severe lack of scientific data on users' current unlocking …

Security and privacy for augmented reality systems

F Roesner, T Kohno, D Molnar - Communications of the ACM, 2014 - dl.acm.org
Security and privacy for augmented reality systems Page 1 review articles 88 communicAtionS
of the Acm | APRil 2014 | vOl. 57 | NO. 4 Pho t oi ll u S tra tion b yb arr yd o wnard augmented …

Are you ready to lock?

S Egelman, S Jain, RS Portnoff, K Liao… - Proceedings of the …, 2014 - dl.acm.org
In addition to storing a plethora of sensitive personal and work information, smartphones
also store sensor data about users and their daily activities. In order to understand users' …

Active user authentication for smartphones: A challenge data set and benchmark results

U Mahbub, S Sarkar, VM Patel… - 2016 IEEE 8th …, 2016 - ieeexplore.ieee.org
In this paper, automated user verification techniques for smartphones are investigated. A
unique non-commercial dataset, the University of Maryland Active Authentication Dataset 02 …

Casa: context-aware scalable authentication

E Hayashi, S Das, S Amini, J Hong… - Proceedings of the Ninth …, 2013 - dl.acm.org
We introduce context-aware scalable authentication (CASA) as a way of balancing security
and usability for authentication. Our core idea is to choose an appropriate form of active …

A survey for user behavior analysis based on machine learning techniques: current models and applications

A G. Martín, A Fernández-Isabel, I Martín de Diego… - Applied …, 2021 - Springer
Significant research has been carried out in the field of User Behavior Analysis, focused on
understanding, modeling and predicting past, present and future behaviors of users …

Which verifiers work?: A benchmark evaluation of touch-based authentication algorithms

A Serwadda, VV Phoha, Z Wang - 2013 IEEE sixth international …, 2013 - ieeexplore.ieee.org
Despite the tremendous need for the evaluation of touch-based authentication as an extra
security layer for mobile devices, the huge disparity in the experimental methodology used …