Abstract—Integration of NFC radios into smartphones is expediting the adoption of mobile devices as the preferred method for accessing physical locations, bank accounts, and other valuable resources. The pervasive nature of authentication using these mobile devices, however, comes with increased security considerations stemming from the possibility of physical loss of the device. To minimize the risk caused by stolen devices, this paper introduces a method for confirming the identity of a device’s user based on her recent macroscopic behavior over space and time. The user’s behavior is continuously recorded by a set of devices embedded in the environment (e.g., Wi-Fi Access Point) and used to train a probabilistic n-gram model. Subsequently...
As ubiquitous computing (ubicomp) technologies reach maturity, smart phones and context-based servic...
User authentication, the process of verifying the identity of a person who connects to important mob...
Mobile devices are one of the most popular technologies in the world. Sales have increased yearly an...
Abstract: Mobile devices such as smart phones and laptops are in common use and carry a vast amount ...
In this paper an adaptive solution to secure the authentication process of cellular phones has been ...
The widespread use of smartphones gives rise to new security and privacy concerns. Smartphone thefts...
The growth in smartphone usage has led to increased user concerns regarding privacy and security. Sm...
Smartphones are context-aware devices that provide a compelling platform for ubiquitous computing an...
Smartphones are context-aware devices that provide a compelling platform for ubiquitous computing an...
Despite the availability of biometrics like face recognition and finger print scanners passwords are...
The file(s) associated with this record are no longer available. [JC][04.02.2013]In the last 20 year...
The paper describes an implementation of a behavioral authentication system, working on sparse geogr...
In the last 20 years mobile devices gained an important role in daily life and became must have item...
Abstract: Since the first handheld cellular phone was introduced in 1970s, the mobile phone has chan...
The widespread usage of smartphones gives rise to new security and privacy concerns. Smartphones are...
As ubiquitous computing (ubicomp) technologies reach maturity, smart phones and context-based servic...
User authentication, the process of verifying the identity of a person who connects to important mob...
Mobile devices are one of the most popular technologies in the world. Sales have increased yearly an...
Abstract: Mobile devices such as smart phones and laptops are in common use and carry a vast amount ...
In this paper an adaptive solution to secure the authentication process of cellular phones has been ...
The widespread use of smartphones gives rise to new security and privacy concerns. Smartphone thefts...
The growth in smartphone usage has led to increased user concerns regarding privacy and security. Sm...
Smartphones are context-aware devices that provide a compelling platform for ubiquitous computing an...
Smartphones are context-aware devices that provide a compelling platform for ubiquitous computing an...
Despite the availability of biometrics like face recognition and finger print scanners passwords are...
The file(s) associated with this record are no longer available. [JC][04.02.2013]In the last 20 year...
The paper describes an implementation of a behavioral authentication system, working on sparse geogr...
In the last 20 years mobile devices gained an important role in daily life and became must have item...
Abstract: Since the first handheld cellular phone was introduced in 1970s, the mobile phone has chan...
The widespread usage of smartphones gives rise to new security and privacy concerns. Smartphones are...
As ubiquitous computing (ubicomp) technologies reach maturity, smart phones and context-based servic...
User authentication, the process of verifying the identity of a person who connects to important mob...
Mobile devices are one of the most popular technologies in the world. Sales have increased yearly an...