Abstract. The use of mobile smart devices for storing sensitive infor-mation and accessing online services is increasing. At the same time, methods for authenticating users into their devices and online services that are not only secure, but also privacy and user-friendly are needed. In this paper, we present our initial explorations of the use of lock pat-tern dynamics as a secure and user-friendly two-factor authentication method. We developed an application for the Android mobile platform to collect data on the way individuals draw lock patterns on a touch-screen. Using a Random Forest machine learning classier this method achieves an average Equal Error Rate (EER) of approximately 10.39%, meaning that lock patterns biometrics can be use...
© 2018 Elsevier Ltd In this paper, we present a behavioral biometric-based smartphone user authentic...
Abstract: Smartphones have become the standard personal device to store private or sensitive informa...
Current state of the art authentication systems for mobile devices primarily rely on single point of...
Part 5: Privacy for Mobile ApplicationsInternational audienceThe use of mobile smart devices for sto...
To protect an Android smartphone against attackers, a lock pattern can be used. Nevertheless, should...
To protect an Android smartphone against attackers, a lock pattern can be used. Nevertheless, should...
Abstract. Mobile devices have become an important part of our every-day life, harvesting more and mo...
In this technological era where smartphone use continues to increase, it is essential to secure user...
AbstractIn this work we investigated user authentication on mobile devices using touch behavior and ...
We investigate whether a classifier can continuously authenticate users based on the way they intera...
With the increased popularity of touch screen mobile phones, touch gesture behavior is becoming more...
Mobile devices, particularly the touch screen mobile devices, are increasingly used to store and acc...
This study introduces a novel authentication methodology; it is based on pattern recognition of fing...
With the increased use of Android smartphones, the Android Pattern Lock graphical password has becom...
Pervasive in nature and extensively used for a wide range of features, smartphone provides functiona...
© 2018 Elsevier Ltd In this paper, we present a behavioral biometric-based smartphone user authentic...
Abstract: Smartphones have become the standard personal device to store private or sensitive informa...
Current state of the art authentication systems for mobile devices primarily rely on single point of...
Part 5: Privacy for Mobile ApplicationsInternational audienceThe use of mobile smart devices for sto...
To protect an Android smartphone against attackers, a lock pattern can be used. Nevertheless, should...
To protect an Android smartphone against attackers, a lock pattern can be used. Nevertheless, should...
Abstract. Mobile devices have become an important part of our every-day life, harvesting more and mo...
In this technological era where smartphone use continues to increase, it is essential to secure user...
AbstractIn this work we investigated user authentication on mobile devices using touch behavior and ...
We investigate whether a classifier can continuously authenticate users based on the way they intera...
With the increased popularity of touch screen mobile phones, touch gesture behavior is becoming more...
Mobile devices, particularly the touch screen mobile devices, are increasingly used to store and acc...
This study introduces a novel authentication methodology; it is based on pattern recognition of fing...
With the increased use of Android smartphones, the Android Pattern Lock graphical password has becom...
Pervasive in nature and extensively used for a wide range of features, smartphone provides functiona...
© 2018 Elsevier Ltd In this paper, we present a behavioral biometric-based smartphone user authentic...
Abstract: Smartphones have become the standard personal device to store private or sensitive informa...
Current state of the art authentication systems for mobile devices primarily rely on single point of...