In an implicit authentication system, a user profile is used as an additional factor to strengthen the authentication of mobile users. The profile consists of features that are con-structed using the history of user actions on her mobile de-vice over time. The profile is stored on the server and is used to authenticate an access request originated from the device at a later time. An access request will include a vector of recent measurements of the features on the device, that will be subsequently matched against the features stored at the server, to accept or reject the request. The features how-ever include private information such as user location or web sites that have been visited. We propose a privacy-preserving implicit authenticatio...
Authentication of smartphone users is important because a lot of sensitive data is stored in the sma...
The increasing development of mobile networks raises new security requirements and concerns. In addi...
Smartphones are the most popular and widespread personal devices. Apart from their conventional use,...
Abstract. In an implicit authentication system, a user profile is used as an additional factor to st...
Part 11: Privacy IIInternational audienceIn an implicit authentication system, a user profile is use...
In an implicit authentication system, a user profile is used as an additional factor to strengthen t...
The file attached to this record is the author's final peer reviewed version. The Publisher's final ...
Implicit authentication schemes are a secondary authentica-tion mechanism that provides authenticati...
Abstract — One major disadvantage of mobile devices is their liability to theft. Since people make m...
Part 1: PrivacyInternational audienceImplicit authentication consists of a server authenticating a u...
The file attached to this record is the author's final peer reviewed version. The Publisher's final ...
In this paper we discuss about authentication services using mobile devices, QR codes and attributeb...
Abstract — since past few years there has been a remarkable rise in the popularity of touch screen m...
We address two distinct problems with de facto mobile device authentication, as provided by a passwo...
Abstract — Users increasingly use their mobile devices to communicate, to conduct business transacti...
Authentication of smartphone users is important because a lot of sensitive data is stored in the sma...
The increasing development of mobile networks raises new security requirements and concerns. In addi...
Smartphones are the most popular and widespread personal devices. Apart from their conventional use,...
Abstract. In an implicit authentication system, a user profile is used as an additional factor to st...
Part 11: Privacy IIInternational audienceIn an implicit authentication system, a user profile is use...
In an implicit authentication system, a user profile is used as an additional factor to strengthen t...
The file attached to this record is the author's final peer reviewed version. The Publisher's final ...
Implicit authentication schemes are a secondary authentica-tion mechanism that provides authenticati...
Abstract — One major disadvantage of mobile devices is their liability to theft. Since people make m...
Part 1: PrivacyInternational audienceImplicit authentication consists of a server authenticating a u...
The file attached to this record is the author's final peer reviewed version. The Publisher's final ...
In this paper we discuss about authentication services using mobile devices, QR codes and attributeb...
Abstract — since past few years there has been a remarkable rise in the popularity of touch screen m...
We address two distinct problems with de facto mobile device authentication, as provided by a passwo...
Abstract — Users increasingly use their mobile devices to communicate, to conduct business transacti...
Authentication of smartphone users is important because a lot of sensitive data is stored in the sma...
The increasing development of mobile networks raises new security requirements and concerns. In addi...
Smartphones are the most popular and widespread personal devices. Apart from their conventional use,...