Surveying the development of biometric user authentication on mobile phones

W Meng, DS Wong, S Furnell… - … Surveys & Tutorials, 2014 - ieeexplore.ieee.org
Designing reliable user authentication on mobile phones is becoming an increasingly
important task to protect users' private information and data. Since biometric approaches can …

“A Stalker's Paradise” How Intimate Partner Abusers Exploit Technology

D Freed, J Palmer, D Minchala, K Levy… - Proceedings of the …, 2018 - dl.acm.org
This paper describes a qualitative study with 89 participants that details how abusers in
intimate partner violence (IPV) contexts exploit technologies to intimidate, threaten, monitor …

Leakiness and creepiness in app space: Perceptions of privacy and mobile app use

I Shklovski, SD Mainwaring, HH Skúladóttir… - Proceedings of the …, 2014 - dl.acm.org
Mobile devices are playing an increasingly intimate role in everyday life. However, users
can be surprised when informed of the data collection and distribution activities of apps they …

Touch me once and i know it's you! implicit authentication based on touch screen patterns

A De Luca, A Hang, F Brudy, C Lindner… - proceedings of the …, 2012 - dl.acm.org
Password patterns, as used on current Android phones, and other shape-based
authentication schemes are highly usable and memorable. In terms of security, they are …

Covert message redaction and recovery in a wireless communication device

JK Whitney, JR Delker - US Patent 8,233,887, 2012 - Google Patents
A wireless communication device comprises a user interface, a memory, a wireless
communication interface, and a processing system. The wireless communication interface is …

{It's} a hard lock life: A field study of smartphone ({Un) Locking} behavior and risk perception

M Harbach, E Von Zezschwitz, A Fichtner… - 10th symposium on …, 2014 - usenix.org
A lot of research is being conducted into improving the usability and security of phone-
unlocking. There is however a severe lack of scientific data on users' current unlocking …

" Privacy is not for me, it's for those rich women": Performative Privacy Practices on Mobile Phones by Women in South Asia

N Sambasivan, G Checkley, A Batool… - … Symposium on Usable …, 2018 - usenix.org
Women in South Asian own fewer personal devices like laptops and phones than women
elsewhere in the world. Further, cultural expectations dictate that they should share mobile …

Privacy concerns for use of voice activated personal assistant in the public space

A Easwara Moorthy, KPL Vu - International Journal of Human …, 2015 - Taylor & Francis
A review of popular technology adoption models identified several factors that are likely to
influence Voice Activated Personal Assistant (VAPA) use in public spaces. To inform design …

Understanding shoulder surfing in the wild: Stories from users and observers

M Eiband, M Khamis, E Von Zezschwitz… - Proceedings of the …, 2017 - dl.acm.org
Research has brought forth a variety of authentication systems to mitigate observation
attacks. However, there is little work about shoulder surfing situations in the real world. We …

Silentsense: silent user identification via touch and movement behavioral biometrics

C Bo, L Zhang, XY Li, Q Huang, Y Wang - Proceedings of the 19th …, 2013 - dl.acm.org
In this work, we present SilentSense, a framework to authenticate users silently and
transparently by exploiting the user touch behavior biometrics and leveraging the integrated …