Security, privacy, and usability in continuous authentication: A survey

AF Baig, S Eskeland - Sensors, 2021 - mdpi.com
Continuous authentication has been proposed as a possible approach for passive and
seamless user authentication, using sensor data comprising biometric, behavioral, and …

Continuous multimodal biometric authentication schemes: a systematic review

R Ryu, S Yeom, SH Kim, D Herbert - IEEE Access, 2021 - ieeexplore.ieee.org
Building safeguards against illegitimate access and authentication is a cornerstone for
securing systems. Existing user authentication schemes suffer from challenges in detecting …

Touch-based continuous mobile device authentication: State-of-the-art, challenges and opportunities

AZ Zaidi, CY Chong, Z Jin, R Parthiban… - Journal of Network and …, 2021 - Elsevier
The advancement in the computational capability and storage size of a modern mobile
device has evolved it into a multi-purpose smart device for individual and business needs …

Continuous authentication using biometrics: An advanced review

G Dahia, L Jesus… - … Reviews: Data Mining …, 2020 - Wiley Online Library
The shortcomings of conventional access control systems for high‐security environments
have led to the concert of continuous authentication. Contrary to traditional verification, in …

Examining the current status and emerging trends in continuous authentication technologies through citation network analysis

JJ Jeong, Y Zolotavkin, R Doss - ACM Computing Surveys, 2022 - dl.acm.org
Continuous Authentication (CA) technologies enable users to be authenticated beyond just
the point of entry. In this article, we conduct a comprehensive review of over 2,300 articles to …

[HTML][HTML] A comprehensive study of document security system, open issues and challenges

RA Khan, SA Lone - Multimedia Tools and Applications, 2021 - Springer
The privacy and security of identity documents like Passports, PAN cards, Driving License as
well as other important personal documents like academic degree certificates are now at an …

The use of biometric identification in countering crime

LY Yugai - Berlin Studies Transnational Journal of Science and …, 2022 - berlinstudies.de
Der Einsatz biometrischer Identifizierung bei der Verbrechensbekämpfung Lyudmila Yuryevna
Yugai Doktorand an der Fakultät für Page 1 Berlin Studies Transnational Journal of Science and …

[HTML][HTML] BLUFADER: Blurred face detection & recognition for privacy-friendly continuous authentication

M Cardaioli, M Conti, G Orazi, PP Tricomi… - Pervasive and Mobile …, 2023 - Elsevier
Authentication and de-authentication phases should occur at the beginning and end of
secure user sessions, respectively. A secure session requires the user to pass the former …

Privacy-friendly de-authentication with BLUFADE: Blurred face detection

M Cardaioli, M Conti, PP Tricomi… - 2022 IEEE International …, 2022 - ieeexplore.ieee.org
Ideally, secure user sessions should start and end with authentication and de-authentication
phases, respectively. While the user must pass the former to start a secure session, the …

MotionID: Towards practical behavioral biometrics-based implicit user authentication on smartphones

MA Alawami, T Abuhmed, M Abuhamad… - Pervasive and Mobile …, 2024 - Elsevier
Traditional one-time authentication mechanisms cannot authenticate smartphone users'
identities throughout the session—the concept of using behavioral-based biometrics …