Continuous authentication modalities allow a device to authenticate users transparently without interrupting them or requiring their attention. This is especially important on smartphones, which are more prone to be lost or stolen than regular computers, and carry plenty of sensitive information. There is a multitude of signals that can be harnessed for continuous authentication on mobile devices, such as touch input, accelerometer, and gyroscope, etc. However, exist-ing public datasets include only a handful of them, limiting the ability to do experiments that involve multiple modali-ties. To fill this gap, we performed a large-scale user study to collect a wide spectrum of signals on smartphones. Our dataset combines more modalities than ...
We investigate whether a classifier can continuously authenticate users based on the way they intera...
Color poster with text and images.Modern user authentication measures on mobile devices often includ...
AFIT-ENG-T-14-J-5 Because mobile devices are easily lost or stolen, continuous authentication is ext...
Continuous authentication modalities allow a device to authenticate users transparently without inte...
Abstract: Smartphones have become the standard personal device to store private or sensitive informa...
Current smartphone security techniques offer less reliability. As an instance, personal identificati...
Abstract The security of modern smartphones is related to the combination of Continuous Authenticati...
Mobile devices are one of the most popular technologies in the world. Sales have increased yearly an...
Most authentication systems (password and biometric feature based) use one-time static authenticatio...
Current state of the art authentication systems for mobile devices primarily rely on single point of...
The growing trend of using smartphones as personal computing platforms to access and store private i...
We introduce hand movement, orientation, and grasp (HMOG), a set of behavioral features to continuou...
Abstract This work investigates how context should be taken into account when performing continuous...
This paper focuses on how touch interactions on smartphones can provide a continuous user authentica...
Despite that tremendous progress has been made in mobile user authentication (MUA) in recent years, ...
We investigate whether a classifier can continuously authenticate users based on the way they intera...
Color poster with text and images.Modern user authentication measures on mobile devices often includ...
AFIT-ENG-T-14-J-5 Because mobile devices are easily lost or stolen, continuous authentication is ext...
Continuous authentication modalities allow a device to authenticate users transparently without inte...
Abstract: Smartphones have become the standard personal device to store private or sensitive informa...
Current smartphone security techniques offer less reliability. As an instance, personal identificati...
Abstract The security of modern smartphones is related to the combination of Continuous Authenticati...
Mobile devices are one of the most popular technologies in the world. Sales have increased yearly an...
Most authentication systems (password and biometric feature based) use one-time static authenticatio...
Current state of the art authentication systems for mobile devices primarily rely on single point of...
The growing trend of using smartphones as personal computing platforms to access and store private i...
We introduce hand movement, orientation, and grasp (HMOG), a set of behavioral features to continuou...
Abstract This work investigates how context should be taken into account when performing continuous...
This paper focuses on how touch interactions on smartphones can provide a continuous user authentica...
Despite that tremendous progress has been made in mobile user authentication (MUA) in recent years, ...
We investigate whether a classifier can continuously authenticate users based on the way they intera...
Color poster with text and images.Modern user authentication measures on mobile devices often includ...
AFIT-ENG-T-14-J-5 Because mobile devices are easily lost or stolen, continuous authentication is ext...