Abstract. In an implicit authentication system, a user profile is used as an additional factor to strengthen the authentication of mobile users. The profile consists of features that are constructed using the history of user actions on her mobile device over time. The profile is stored on the server and is used to authenticate an access request originated from the device at a later time. An access request will include a vector of recent measurements of the features on the device, that will be sub-sequently matched against the features stored at the server, to accept or reject the request. The features however include private information such as user location or web sites that have been visited. We propose a privacy-preserving implicit authe...
Smartphones contain a wealth of personal and corporate data. Several surveys have reported that abou...
We address two distinct problems with de facto mobile device authentication, as provided by a passwo...
Since password-based authentication is no longer sufficient for web applications, additional authent...
Part 11: Privacy IIInternational audienceIn an implicit authentication system, a user profile is use...
In an implicit authentication system, a user profile is used as an additional factor to strengthen t...
In an implicit authentication system, a user profile is used as an additional factor to strengthen t...
Part 1: PrivacyInternational audienceImplicit authentication consists of a server authenticating a u...
The file attached to this record is the author's final peer reviewed version. The Publisher's final ...
Implicit authentication schemes are a secondary authentica-tion mechanism that provides authenticati...
Abstract — One major disadvantage of mobile devices is their liability to theft. Since people make m...
In this work, we proposed dynamic retraining (RU), wind vane module (WVM), BubbleMap (BMap), and rei...
The file attached to this record is the author's final peer reviewed version. The Publisher's final ...
Implicit authentication (IA) transparently authenticates users by utilizing their behavioral data sa...
In this paper we discuss about authentication services using mobile devices, QR codes and attributeb...
This paper addresses a special and imperceptible class of privacy, called implicit privacy. In contr...
Smartphones contain a wealth of personal and corporate data. Several surveys have reported that abou...
We address two distinct problems with de facto mobile device authentication, as provided by a passwo...
Since password-based authentication is no longer sufficient for web applications, additional authent...
Part 11: Privacy IIInternational audienceIn an implicit authentication system, a user profile is use...
In an implicit authentication system, a user profile is used as an additional factor to strengthen t...
In an implicit authentication system, a user profile is used as an additional factor to strengthen t...
Part 1: PrivacyInternational audienceImplicit authentication consists of a server authenticating a u...
The file attached to this record is the author's final peer reviewed version. The Publisher's final ...
Implicit authentication schemes are a secondary authentica-tion mechanism that provides authenticati...
Abstract — One major disadvantage of mobile devices is their liability to theft. Since people make m...
In this work, we proposed dynamic retraining (RU), wind vane module (WVM), BubbleMap (BMap), and rei...
The file attached to this record is the author's final peer reviewed version. The Publisher's final ...
Implicit authentication (IA) transparently authenticates users by utilizing their behavioral data sa...
In this paper we discuss about authentication services using mobile devices, QR codes and attributeb...
This paper addresses a special and imperceptible class of privacy, called implicit privacy. In contr...
Smartphones contain a wealth of personal and corporate data. Several surveys have reported that abou...
We address two distinct problems with de facto mobile device authentication, as provided by a passwo...
Since password-based authentication is no longer sufficient for web applications, additional authent...