An unlocked mobile device can be a treasure trove of private information. Adversaries that are socially close to the user are in a particularly favorable position to authentication code and can even be handed the device for a legitimate task. To address this threat, we propose a new authentication concept that assumes that, by default, a user is authenticating under duress. An inconspicuous side-channel interaction with the device at authentication time dictates whether it grants regular access or enters a secure mode. This paper explores how systems based on this concept can help coping with shoulder-surfing while also allowing for impromptu device sharing
Assistive environments employ multiple types of devices to monitor human actions and identify critic...
As we are evolving towards ubiquitous computing, users carry an increasing num-ber of mobile devices...
Part 3: Access Control, Trust and Identity ManagementInternational audienceThe use of deception to e...
Mobile devices are becoming more pervasive and more advanced with respect to their processing power ...
As our intimate lives become more tangled with the smartphones we carry, privacy has become an incre...
Mobile devices are ubiquitous in today\u27s society, and the usage of these devices for secure tasks...
Abstract. Nowadays, Smartphones are widely used and they have a growing market share of already more...
Recently, mobile terminals such as smartphones have come into widespread use. Most of such mobile te...
To stop attackers from accessing protected contents of a website or a mobile application, authentica...
Although mobile devices provide access to a plethora of sensitive data, most users still only protec...
Although mobile devices provide access to a plethora of sensitive data, most users still only protec...
ABSTRACT—Security can only be guaranteed as long as the hardware and other key parameters, including...
We address the problem of locking and unlocking a device, such as a laptop, a phone or a security to...
In this article, we present a new user authentication technique for touchscreen-based smartphone use...
We address two distinct problems with de facto mobile device authentication, as provided by a passwo...
Assistive environments employ multiple types of devices to monitor human actions and identify critic...
As we are evolving towards ubiquitous computing, users carry an increasing num-ber of mobile devices...
Part 3: Access Control, Trust and Identity ManagementInternational audienceThe use of deception to e...
Mobile devices are becoming more pervasive and more advanced with respect to their processing power ...
As our intimate lives become more tangled with the smartphones we carry, privacy has become an incre...
Mobile devices are ubiquitous in today\u27s society, and the usage of these devices for secure tasks...
Abstract. Nowadays, Smartphones are widely used and they have a growing market share of already more...
Recently, mobile terminals such as smartphones have come into widespread use. Most of such mobile te...
To stop attackers from accessing protected contents of a website or a mobile application, authentica...
Although mobile devices provide access to a plethora of sensitive data, most users still only protec...
Although mobile devices provide access to a plethora of sensitive data, most users still only protec...
ABSTRACT—Security can only be guaranteed as long as the hardware and other key parameters, including...
We address the problem of locking and unlocking a device, such as a laptop, a phone or a security to...
In this article, we present a new user authentication technique for touchscreen-based smartphone use...
We address two distinct problems with de facto mobile device authentication, as provided by a passwo...
Assistive environments employ multiple types of devices to monitor human actions and identify critic...
As we are evolving towards ubiquitous computing, users carry an increasing num-ber of mobile devices...
Part 3: Access Control, Trust and Identity ManagementInternational audienceThe use of deception to e...