Multi-factor authentication: A survey
Today, digitalization decisively penetrates all the sides of the modern society. One of the key
enablers to maintain this process secure is authentication. It covers many different areas of a …
enablers to maintain this process secure is authentication. It covers many different areas of a …
Behavioral biometrics for continuous authentication in the internet-of-things era: An artificial intelligence perspective
In the Internet-of-Things (IoT) era, user authentication is essential to ensure the security of
connected devices and the customization of passive services. However, conventional …
connected devices and the customization of passive services. However, conventional …
Smartphone and smartwatch-based biometrics using activities of daily living
GM Weiss, K Yoneda, T Hayajneh - Ieee Access, 2019 - ieeexplore.ieee.org
Smartphones and smartwatches, which include powerful sensors, provide a readily
available platform for implementing and deploying mobile motion-based behavioral …
available platform for implementing and deploying mobile motion-based behavioral …
User authentication schemes using machine learning methods—a review
N Siddiqui, L Pryor, R Dave - Proceedings of International Conference on …, 2021 - Springer
With the recent advancements in technology, more and more people rely on their personal
devices to store their sensitive information. Concurrently, the environment in which these …
devices to store their sensitive information. Concurrently, the environment in which these …
Hold and sign: A novel behavioral biometrics for smartphone user authentication
A Buriro, B Crispo, F Delfrari… - 2016 IEEE security and …, 2016 - ieeexplore.ieee.org
The search for new authentication methods to replace passwords for modern mobile devices
such as smartphones and tablets has attracted a substantial amount of research in recent …
such as smartphones and tablets has attracted a substantial amount of research in recent …
AnswerAuth: A bimodal behavioral biometric-based user authentication scheme for smartphones
In this paper, we present a behavioral biometric-based smartphone user authentication
mechanism, namely, AnswerAuth, which relies on the very common users' behavior …
mechanism, namely, AnswerAuth, which relies on the very common users' behavior …
TouchWB: Touch behavioral user authentication based on web browsing on smartphones
Modern mobile devices especially smartphones have rapidly evolved and are widely
adopted by people of different ages. Smartphones can assist users in a variety of activities …
adopted by people of different ages. Smartphones can assist users in a variety of activities …
Liveness is not enough: Enhancing fingerprint authentication with behavioral biometrics to defeat puppet attacks
Fingerprint authentication has gained increasing popularity on mobile devices in recent
years. However, it is vulnerable to presentation attacks, which include that an attacker …
years. However, it is vulnerable to presentation attacks, which include that an attacker …
Strengthen user authentication on mobile devices by using user's touch dynamics pattern
Mobile devices, particularly the touch screen mobile devices, are increasingly used to store
and access private and sensitive data or services, and this has led to an increased demand …
and access private and sensitive data or services, and this has led to an increased demand …
Identifying smartphone users based on how they interact with their phones
The continuous advancement in the Internet of Things technology allows people to connect
anywhere at any time, thus showing great potential in technology like smart devices …
anywhere at any time, thus showing great potential in technology like smart devices …