mHealth authentication approach based 3D touchscreen and microphone sensors for real-time remote healthcare monitoring system: comprehensive review, open …

ML Shuwandy, BB Zaidan, AA Zaidan… - Computer Science …, 2020 - Elsevier
Patient authentication acquires superior attention as a necessary security requirement in a
remote health monitoring system. From a usability perspective, credential-based …

Sensor-based mHealth authentication for real-time remote healthcare monitoring system: A multilayer systematic review

ML Shuwandy, BB Zaidan, AA Zaidan… - Journal of medical …, 2019 - Springer
The new and groundbreaking real-time remote healthcare monitoring system on sensor-
based mobile health (mHealth) authentication in telemedicine has considerably bounded …

Sensor-based continuous authentication of smartphones' users using behavioral biometrics: A contemporary survey

M Abuhamad, A Abusnaina, DH Nyang… - IEEE Internet of …, 2020 - ieeexplore.ieee.org
Mobile devices and technologies have become increasingly popular, offering comparable
storage and computational capabilities to desktop computers allowing users to store and …

Activity recognition with smartphone sensors

X Su, H Tong, P Ji - Tsinghua science and technology, 2014 - ieeexplore.ieee.org
The ubiquity of smartphones together with their ever-growing computing, networking, and
sensing powers have been changing the landscape of people's daily life. Among others …

Stationary mobile behavioral biometrics: A survey

A Ray-Dowling, D Hou, S Schuckers - Computers & Security, 2023 - Elsevier
Current security mechanisms in mobile devices such as PINs, passwords, patterned
passwords, and biometrics are one-time entry-point authentication and vulnerable to attacks …

Gait2Vec: continuous authentication of smartphone users based on gait behavior

L He, C Ma, C Tu, Y Zhang - 2022 IEEE 25th International …, 2022 - ieeexplore.ieee.org
Since gait is hard to imitate and can be easily collected by smartphone inertial sensors, it
can be applied to user authentication. Traditional neural network based methods tend to …

[PDF][PDF] Surveying biometric authentication for mobile device security

TJ Neal, DL Woodard - Journal of Pattern Recognition Research, 2016 - cse.usf.edu
Mobile devices, such as smartphones and tablets, are frequently used for creation and
transmission of private and sensitive messages and files. While personal identification …

Authentication in mobile devices through hand gesture recognition

J Guerra-Casanova, C Sánchez-Ávila… - International Journal of …, 2012 - Springer
This article proposes an innovative biometric technique based on the idea of authenticating
a person on a mobile device by gesture recognition. To accomplish this aim, a user is …

Handwritten signature verification using wrist-worn devices

A Levy, B Nassi, Y Elovici, E Shmueli - … of the ACM on Interactive, Mobile …, 2018 - dl.acm.org
This paper suggests a novel verification system for handwritten signatures. The proposed
system is based on capturing motion signals from the sensors of wrist-worn devices, such as …

AttAuth: An Implicit Authentication Framework for Smartphone Users Using Multi-Modality Data

C Zhao, F Gao, Z Shen - IEEE Internet of Things Journal, 2023 - ieeexplore.ieee.org
Smartphones have become the most important devices for users to communicate and
interact with different forms of media, and at the same time stored a large amount of sensitive …