Security, privacy, and usability in continuous authentication: A survey
AF Baig, S Eskeland - Sensors, 2021 - mdpi.com
Continuous authentication has been proposed as a possible approach for passive and
seamless user authentication, using sensor data comprising biometric, behavioral, and …
seamless user authentication, using sensor data comprising biometric, behavioral, and …
Continuous multimodal biometric authentication schemes: a systematic review
Building safeguards against illegitimate access and authentication is a cornerstone for
securing systems. Existing user authentication schemes suffer from challenges in detecting …
securing systems. Existing user authentication schemes suffer from challenges in detecting …
Touch-based continuous mobile device authentication: State-of-the-art, challenges and opportunities
The advancement in the computational capability and storage size of a modern mobile
device has evolved it into a multi-purpose smart device for individual and business needs …
device has evolved it into a multi-purpose smart device for individual and business needs …
Continuous authentication using biometrics: An advanced review
G Dahia, L Jesus… - … Reviews: Data Mining …, 2020 - Wiley Online Library
The shortcomings of conventional access control systems for high‐security environments
have led to the concert of continuous authentication. Contrary to traditional verification, in …
have led to the concert of continuous authentication. Contrary to traditional verification, in …
Examining the current status and emerging trends in continuous authentication technologies through citation network analysis
Continuous Authentication (CA) technologies enable users to be authenticated beyond just
the point of entry. In this article, we conduct a comprehensive review of over 2,300 articles to …
the point of entry. In this article, we conduct a comprehensive review of over 2,300 articles to …
[HTML][HTML] A comprehensive study of document security system, open issues and challenges
The privacy and security of identity documents like Passports, PAN cards, Driving License as
well as other important personal documents like academic degree certificates are now at an …
well as other important personal documents like academic degree certificates are now at an …
The use of biometric identification in countering crime
LY Yugai - Berlin Studies Transnational Journal of Science and …, 2022 - berlinstudies.de
Der Einsatz biometrischer Identifizierung bei der Verbrechensbekämpfung Lyudmila Yuryevna
Yugai Doktorand an der Fakultät für Page 1 Berlin Studies Transnational Journal of Science and …
Yugai Doktorand an der Fakultät für Page 1 Berlin Studies Transnational Journal of Science and …
[HTML][HTML] BLUFADER: Blurred face detection & recognition for privacy-friendly continuous authentication
Authentication and de-authentication phases should occur at the beginning and end of
secure user sessions, respectively. A secure session requires the user to pass the former …
secure user sessions, respectively. A secure session requires the user to pass the former …
Privacy-friendly de-authentication with BLUFADE: Blurred face detection
Ideally, secure user sessions should start and end with authentication and de-authentication
phases, respectively. While the user must pass the former to start a secure session, the …
phases, respectively. While the user must pass the former to start a secure session, the …
MotionID: Towards practical behavioral biometrics-based implicit user authentication on smartphones
Traditional one-time authentication mechanisms cannot authenticate smartphone users'
identities throughout the session—the concept of using behavioral-based biometrics …
identities throughout the session—the concept of using behavioral-based biometrics …