Surveying the development of biometric user authentication on mobile phones
Designing reliable user authentication on mobile phones is becoming an increasingly
important task to protect users' private information and data. Since biometric approaches can …
important task to protect users' private information and data. Since biometric approaches can …
Authentication of smartphone users using behavioral biometrics
A Alzubaidi, J Kalita - IEEE Communications Surveys & …, 2016 - ieeexplore.ieee.org
Smartphones and tablets have become ubiquitous in our daily lives. Smartphones, in
particular, have become more than personal assistants. These devices have provided new …
particular, have become more than personal assistants. These devices have provided new …
Passwords and the evolution of imperfect authentication
Passwords and the evolution of imperfect authentication Page 1 78 COMMUNICATIONS OF
THE ACM | JULY 2015 | VOL. 58 | NO. 7 contributed articles DOI:10.1145/2699390 Theory on …
THE ACM | JULY 2015 | VOL. 58 | NO. 7 contributed articles DOI:10.1145/2699390 Theory on …
{It's} a hard lock life: A field study of smartphone ({Un) Locking} behavior and risk perception
M Harbach, E Von Zezschwitz, A Fichtner… - 10th symposium on …, 2014 - usenix.org
A lot of research is being conducted into improving the usability and security of phone-
unlocking. There is however a severe lack of scientific data on users' current unlocking …
unlocking. There is however a severe lack of scientific data on users' current unlocking …
Security and privacy for augmented reality systems
Security and privacy for augmented reality systems Page 1 review articles 88 communicAtionS
of the Acm | APRil 2014 | vOl. 57 | NO. 4 Pho t oi ll u S tra tion b yb arr yd o wnard augmented …
of the Acm | APRil 2014 | vOl. 57 | NO. 4 Pho t oi ll u S tra tion b yb arr yd o wnard augmented …
Are you ready to lock?
In addition to storing a plethora of sensitive personal and work information, smartphones
also store sensor data about users and their daily activities. In order to understand users' …
also store sensor data about users and their daily activities. In order to understand users' …
Active user authentication for smartphones: A challenge data set and benchmark results
In this paper, automated user verification techniques for smartphones are investigated. A
unique non-commercial dataset, the University of Maryland Active Authentication Dataset 02 …
unique non-commercial dataset, the University of Maryland Active Authentication Dataset 02 …
Casa: context-aware scalable authentication
We introduce context-aware scalable authentication (CASA) as a way of balancing security
and usability for authentication. Our core idea is to choose an appropriate form of active …
and usability for authentication. Our core idea is to choose an appropriate form of active …
A survey for user behavior analysis based on machine learning techniques: current models and applications
Significant research has been carried out in the field of User Behavior Analysis, focused on
understanding, modeling and predicting past, present and future behaviors of users …
understanding, modeling and predicting past, present and future behaviors of users …
Which verifiers work?: A benchmark evaluation of touch-based authentication algorithms
Despite the tremendous need for the evaluation of touch-based authentication as an extra
security layer for mobile devices, the huge disparity in the experimental methodology used …
security layer for mobile devices, the huge disparity in the experimental methodology used …