Security and privacy challenges in mobile cloud computing: Survey and way ahead

MB Mollah, MAK Azad, A Vasilakos - Journal of Network and Computer …, 2017 - Elsevier
The rapid growth of mobile computing is seriously challenged by the resource constrained
mobile devices. However, the growth of mobile computing can be enhanced by integrating …

Surveying the development of biometric user authentication on mobile phones

W Meng, DS Wong, S Furnell… - … Surveys & Tutorials, 2014 - ieeexplore.ieee.org
Designing reliable user authentication on mobile phones is becoming an increasingly
important task to protect users' private information and data. Since biometric approaches can …

HMOG: New behavioral biometric features for continuous authentication of smartphone users

Z Sitová, J Šeděnka, Q Yang, G Peng… - IEEE Transactions …, 2015 - ieeexplore.ieee.org
We introduce hand movement, orientation, and grasp (HMOG), a set of behavioral features
to continuously authenticate smartphone users. HMOG features unobtrusively capture subtle …

Behavioral biometrics & continuous user authentication on mobile devices: A survey

I Stylios, S Kokolakis, O Thanou, S Chatzis - Information Fusion, 2021 - Elsevier
This paper offers an up-to-date, comprehensive, extensive and targeted survey on
Behavioral Biometrics and Continuous Authentication technologies for mobile devices. Our …

Authentication of smartphone users using behavioral biometrics

A Alzubaidi, J Kalita - IEEE Communications Surveys & …, 2016 - ieeexplore.ieee.org
Smartphones and tablets have become ubiquitous in our daily lives. Smartphones, in
particular, have become more than personal assistants. These devices have provided new …

A survey on behavioral biometric authentication on smartphones

A Mahfouz, TM Mahmoud, AS Eldin - Journal of information security and …, 2017 - Elsevier
Recent research has shown the possibility of using smartphones' sensors and accessories
to extract some behavioral attributes such as touch dynamics, keystroke dynamics and gait …

A survey on touch dynamics authentication in mobile devices

PS Teh, N Zhang, ABJ Teoh, K Chen - Computers & Security, 2016 - Elsevier
There have been research activities in the area of keystroke dynamics biometrics on
physical keyboards (desktop computers or conventional mobile phones) undertaken in the …

Continuous authentication of smartphone users based on activity pattern recognition using passive mobile sensing

M Ehatisham-ul-Haq, MA Azam, U Naeem… - Journal of Network and …, 2018 - Elsevier
Smartphones are inescapable devices, which are becoming more and more intelligent and
context-aware with emerging sensing, networking, and computing capabilities. They offer a …

Authentication of smartphone users based on activity recognition and mobile sensing

M Ehatisham-ul-Haq, MA Azam, J Loo, K Shuang… - Sensors, 2017 - mdpi.com
Smartphones are context-aware devices that provide a compelling platform for ubiquitous
computing and assist users in accomplishing many of their routine tasks anytime and …

mHealth authentication approach based 3D touchscreen and microphone sensors for real-time remote healthcare monitoring system: comprehensive review, open …

ML Shuwandy, BB Zaidan, AA Zaidan… - Computer Science …, 2020 - Elsevier
Patient authentication acquires superior attention as a necessary security requirement in a
remote health monitoring system. From a usability perspective, credential-based …