A survey of keystroke dynamics biometrics
Research on keystroke dynamics biometrics has been increasing, especially in the last
decade. The main motivation behind this effort is due to the fact that keystroke dynamics …
decade. The main motivation behind this effort is due to the fact that keystroke dynamics …
Modern authentication schemes in smartphones and IoT devices: An empirical survey
User authentication remains a challenging issue, despite the existence of a large number of
proposed solutions, such as traditional text-based, graphical-based, biometrics-based, Web …
proposed solutions, such as traditional text-based, graphical-based, biometrics-based, Web …
A survey on behavioral biometric authentication on smartphones
Recent research has shown the possibility of using smartphones' sensors and accessories
to extract some behavioral attributes such as touch dynamics, keystroke dynamics and gait …
to extract some behavioral attributes such as touch dynamics, keystroke dynamics and gait …
Improving accuracy, applicability and usability of keystroke biometrics on mobile touchscreen devices
Authentication methods can be improved by considering implicit, individual behavioural
cues. In particular, verifying users based on typing behaviour has been widely studied with …
cues. In particular, verifying users based on typing behaviour has been widely studied with …
Touch gestures based biometric authentication scheme for touchscreen mobile phones
Nowadays, touchscreen mobile phones make up a larger and larger share in the mobile
market. Users also often use their mobile phones (eg, Android phones) to store personal …
market. Users also often use their mobile phones (eg, Android phones) to store personal …
Exploring touch-screen biometrics for user identification on smart phones
J Angulo, E Wästlund - Privacy and Identity Management for Life: 7th IFIP …, 2012 - Springer
The use of mobile smart devices for storing sensitive information and accessing online
services is increasing. At the same time, methods for authenticating users into their devices …
services is increasing. At the same time, methods for authenticating users into their devices …
Continuous mobile authentication using virtual key typing biometrics
Due to the increasing popularity of mobile technologies, sensitive user information is often
stored on mobile devices. However, the essential task of mobile user authentication is …
stored on mobile devices. However, the essential task of mobile user authentication is …
A systematic literature review on latest keystroke dynamics based models
The purpose of this study is to conduct a comprehensive evaluation and analysis of the most
recent studies on the implications of keystroke dynamics (KD) patterns in user …
recent studies on the implications of keystroke dynamics (KD) patterns in user …
Evaluating the influence of targets and hand postures on touch-based behavioural biometrics
Users' individual differences in their mobile touch behaviour can help to continuously verify
identity and protect personal data. However, little is known about the influence of GUI …
identity and protect personal data. However, little is known about the influence of GUI …
Reconciling user privacy and implicit authentication for mobile devices
SF Shahandashti, R Safavi-Naini, NA Safa - Computers & Security, 2015 - Elsevier
In an implicit authentication system, a user profile is used as an additional factor to
strengthen the authentication of mobile users. The profile consists of features that are …
strengthen the authentication of mobile users. The profile consists of features that are …