Common authentication mechanisms in mobile devices such as passwords and Personal Identification Number have failed to keep up with the rapid pace of challenges associated with the use of ubiquitous devices over the Internet, since they can easily be lost or stolen. Thus, it is important to develop authentication mechanisms that can be adapted to such an environment. Biometric-based person recognition is a good alternative to overcome the difficulties of password and token approaches, since biometrics cannot be easily stolen or forgotten. An important characteristic of biometric authentication is that there is an explicit connection with the user's identity, since biometrics rely entirely on behavioral and physiological characteristics of h...
We investigate whether a classifier can continuously authenticate users based on the way they intera...
Smartphone security constitutes a necessary requirement due to the sensitive information they conta...
© 2019 IEEE. Mobile devices are increasingly used to store private and sensitive data, and this has ...
Vast majority of modern smartphones is equipped with touch-sensitive screens. Being precise and accu...
With the booming of smart phone and high-speed wireless networks in recent years, applications and d...
With the increased popularity of touchscreen mobile phones, touch gesture behavior is becoming more ...
AbstractIn this work we investigated user authentication on mobile devices using touch behavior and ...
The use of mobile devices has extended to all areas of human life and has changed the way people wor...
Among all the security technologies of smartphones, biometrics authentication technologies are on th...
This article proposes an innovative biometric technique based on the idea of authenticating a person...
When developing protection mechanisms of the confidential data on mobile devices, a balance of relia...
The need to secure private or sensitive information in our mobile devices, desktop and laptop comput...
Mobile devices such as smartphones and tablets are nowadays daily employed by more than 3 billion pe...
© 2016 Elsevier Ltd. All rights reserved. There have been research activities in the area of keystro...
Mobile devices, particularly the touch screen mobile devices, are increasingly used to store and acc...
We investigate whether a classifier can continuously authenticate users based on the way they intera...
Smartphone security constitutes a necessary requirement due to the sensitive information they conta...
© 2019 IEEE. Mobile devices are increasingly used to store private and sensitive data, and this has ...
Vast majority of modern smartphones is equipped with touch-sensitive screens. Being precise and accu...
With the booming of smart phone and high-speed wireless networks in recent years, applications and d...
With the increased popularity of touchscreen mobile phones, touch gesture behavior is becoming more ...
AbstractIn this work we investigated user authentication on mobile devices using touch behavior and ...
The use of mobile devices has extended to all areas of human life and has changed the way people wor...
Among all the security technologies of smartphones, biometrics authentication technologies are on th...
This article proposes an innovative biometric technique based on the idea of authenticating a person...
When developing protection mechanisms of the confidential data on mobile devices, a balance of relia...
The need to secure private or sensitive information in our mobile devices, desktop and laptop comput...
Mobile devices such as smartphones and tablets are nowadays daily employed by more than 3 billion pe...
© 2016 Elsevier Ltd. All rights reserved. There have been research activities in the area of keystro...
Mobile devices, particularly the touch screen mobile devices, are increasingly used to store and acc...
We investigate whether a classifier can continuously authenticate users based on the way they intera...
Smartphone security constitutes a necessary requirement due to the sensitive information they conta...
© 2019 IEEE. Mobile devices are increasingly used to store private and sensitive data, and this has ...