mHealth authentication approach based 3D touchscreen and microphone sensors for real-time remote healthcare monitoring system: comprehensive review, open …
Patient authentication acquires superior attention as a necessary security requirement in a
remote health monitoring system. From a usability perspective, credential-based …
remote health monitoring system. From a usability perspective, credential-based …
Sensor-based mHealth authentication for real-time remote healthcare monitoring system: A multilayer systematic review
The new and groundbreaking real-time remote healthcare monitoring system on sensor-
based mobile health (mHealth) authentication in telemedicine has considerably bounded …
based mobile health (mHealth) authentication in telemedicine has considerably bounded …
Sensor-based continuous authentication of smartphones' users using behavioral biometrics: A contemporary survey
Mobile devices and technologies have become increasingly popular, offering comparable
storage and computational capabilities to desktop computers allowing users to store and …
storage and computational capabilities to desktop computers allowing users to store and …
Activity recognition with smartphone sensors
The ubiquity of smartphones together with their ever-growing computing, networking, and
sensing powers have been changing the landscape of people's daily life. Among others …
sensing powers have been changing the landscape of people's daily life. Among others …
Stationary mobile behavioral biometrics: A survey
Current security mechanisms in mobile devices such as PINs, passwords, patterned
passwords, and biometrics are one-time entry-point authentication and vulnerable to attacks …
passwords, and biometrics are one-time entry-point authentication and vulnerable to attacks …
Gait2Vec: continuous authentication of smartphone users based on gait behavior
Since gait is hard to imitate and can be easily collected by smartphone inertial sensors, it
can be applied to user authentication. Traditional neural network based methods tend to …
can be applied to user authentication. Traditional neural network based methods tend to …
[PDF][PDF] Surveying biometric authentication for mobile device security
TJ Neal, DL Woodard - Journal of Pattern Recognition Research, 2016 - cse.usf.edu
Mobile devices, such as smartphones and tablets, are frequently used for creation and
transmission of private and sensitive messages and files. While personal identification …
transmission of private and sensitive messages and files. While personal identification …
Authentication in mobile devices through hand gesture recognition
J Guerra-Casanova, C Sánchez-Ávila… - International Journal of …, 2012 - Springer
This article proposes an innovative biometric technique based on the idea of authenticating
a person on a mobile device by gesture recognition. To accomplish this aim, a user is …
a person on a mobile device by gesture recognition. To accomplish this aim, a user is …
Handwritten signature verification using wrist-worn devices
This paper suggests a novel verification system for handwritten signatures. The proposed
system is based on capturing motion signals from the sensors of wrist-worn devices, such as …
system is based on capturing motion signals from the sensors of wrist-worn devices, such as …
AttAuth: An Implicit Authentication Framework for Smartphone Users Using Multi-Modality Data
C Zhao, F Gao, Z Shen - IEEE Internet of Things Journal, 2023 - ieeexplore.ieee.org
Smartphones have become the most important devices for users to communicate and
interact with different forms of media, and at the same time stored a large amount of sensitive …
interact with different forms of media, and at the same time stored a large amount of sensitive …