Continuous user authentication on smartphone via behavioral biometrics: a survey
PK Rayani, S Changder - Multimedia Tools and Applications, 2023 - Springer
The use of ubiquitous devices is increasing worldwide due to signs of progress in
sophisticated hardware technology with cutting-edge features. These features offer most …
sophisticated hardware technology with cutting-edge features. These features offer most …
[PDF][PDF] Mechanisms of Authentication toward Habitude Pattern Lock and ECG: An overview.
Smartphones contain access to user-sensitive information such as contacts, e-mails, e-
payments among others. Therefore, it is imperative that proper smartphone authentication …
payments among others. Therefore, it is imperative that proper smartphone authentication …
Prototyping usable privacy and security systems: Insights from experts
Iterative design, implementation, and evaluation of prototype systems is a common
approach in Human-Computer Interaction (HCI) and Usable Privacy and Security (USEC); …
approach in Human-Computer Interaction (HCI) and Usable Privacy and Security (USEC); …
Security analysis and psychological study of authentication methods with PIN codes
Touch screens have become ubiquitous in the past few years, like for instance in
smartphones and tablets. These devices are often the entry door to numerous information …
smartphones and tablets. These devices are often the entry door to numerous information …
Addressing misconceptions about password security effectively
P Mayer, M Volkamer - Proceedings of the 7th Workshop on Socio …, 2018 - dl.acm.org
Nowadays, most users need more passwords than they can handle. Consequently, users
have developed a multitude of strategies to cope with this situation. Some of these coping …
have developed a multitude of strategies to cope with this situation. Some of these coping …
[PDF][PDF] Behavioral Biometric Authentication in Android Unlock Patterns through Machine Learning.
J Torres, S de los Santos, E Alepis, C Patsakis - ICISSP, 2019 - pdfs.semanticscholar.org
The penetration of ICT in our everyday lives has introduced numerous automations, and the
continuous need for communication has made mobile devices indispensable. As a result …
continuous need for communication has made mobile devices indispensable. As a result …
Context awareness for improved continuous face authentication on mobile devices
M Smith-Creasey, FA Albalooshi… - 2018 IEEE 16th Intl …, 2018 - ieeexplore.ieee.org
In this paper we produce a transparent continuous facial authentication scheme that is
aware of the current activity and illumination context. It has recently been shown that …
aware of the current activity and illumination context. It has recently been shown that …
Optimizing human hand gestures for AI-systems
J Schneider - AI Communications, 2022 - content.iospress.com
Humans interact more and more with systems containing AI components. In this work, we
focus on hand gestures such as handwriting and sketches serving as inputs to such …
focus on hand gestures such as handwriting and sketches serving as inputs to such …
Mobile nir iris recognition: Identifying problems and solutions
H Hofbauer, E Jalilian, AF Sequeira… - 2018 IEEE 9th …, 2018 - ieeexplore.ieee.org
The spread of biometric applications in mobile devices handled by untrained users opened
the door to sources of noise in mobile iris recognition such as larger extent of rotation in the …
the door to sources of noise in mobile iris recognition such as larger extent of rotation in the …
UnlockLearning–Investigating the Integration of Vocabulary Learning Tasks into the Smartphone Authentication Process
Frequent repetition of vocabulary is essential for effective language learning. To increase
exposure to learning content, this work explores the integration of vocabulary tasks into the …
exposure to learning content, this work explores the integration of vocabulary tasks into the …