Security and privacy challenges in mobile cloud computing: Survey and way ahead
MB Mollah, MAK Azad, A Vasilakos - Journal of Network and Computer …, 2017 - Elsevier
The rapid growth of mobile computing is seriously challenged by the resource constrained
mobile devices. However, the growth of mobile computing can be enhanced by integrating …
mobile devices. However, the growth of mobile computing can be enhanced by integrating …
Surveying the development of biometric user authentication on mobile phones
Designing reliable user authentication on mobile phones is becoming an increasingly
important task to protect users' private information and data. Since biometric approaches can …
important task to protect users' private information and data. Since biometric approaches can …
HMOG: New behavioral biometric features for continuous authentication of smartphone users
We introduce hand movement, orientation, and grasp (HMOG), a set of behavioral features
to continuously authenticate smartphone users. HMOG features unobtrusively capture subtle …
to continuously authenticate smartphone users. HMOG features unobtrusively capture subtle …
Behavioral biometrics & continuous user authentication on mobile devices: A survey
This paper offers an up-to-date, comprehensive, extensive and targeted survey on
Behavioral Biometrics and Continuous Authentication technologies for mobile devices. Our …
Behavioral Biometrics and Continuous Authentication technologies for mobile devices. Our …
Authentication of smartphone users using behavioral biometrics
A Alzubaidi, J Kalita - IEEE Communications Surveys & …, 2016 - ieeexplore.ieee.org
Smartphones and tablets have become ubiquitous in our daily lives. Smartphones, in
particular, have become more than personal assistants. These devices have provided new …
particular, have become more than personal assistants. These devices have provided new …
A survey on behavioral biometric authentication on smartphones
Recent research has shown the possibility of using smartphones' sensors and accessories
to extract some behavioral attributes such as touch dynamics, keystroke dynamics and gait …
to extract some behavioral attributes such as touch dynamics, keystroke dynamics and gait …
A survey on touch dynamics authentication in mobile devices
There have been research activities in the area of keystroke dynamics biometrics on
physical keyboards (desktop computers or conventional mobile phones) undertaken in the …
physical keyboards (desktop computers or conventional mobile phones) undertaken in the …
Continuous authentication of smartphone users based on activity pattern recognition using passive mobile sensing
Smartphones are inescapable devices, which are becoming more and more intelligent and
context-aware with emerging sensing, networking, and computing capabilities. They offer a …
context-aware with emerging sensing, networking, and computing capabilities. They offer a …
Authentication of smartphone users based on activity recognition and mobile sensing
Smartphones are context-aware devices that provide a compelling platform for ubiquitous
computing and assist users in accomplishing many of their routine tasks anytime and …
computing and assist users in accomplishing many of their routine tasks anytime and …
mHealth authentication approach based 3D touchscreen and microphone sensors for real-time remote healthcare monitoring system: comprehensive review, open …
Patient authentication acquires superior attention as a necessary security requirement in a
remote health monitoring system. From a usability perspective, credential-based …
remote health monitoring system. From a usability perspective, credential-based …