The file attached to this record is the author's final peer reviewed version. The Publisher's final version can be found by following the DOI link.In order to address the increasing compromise of user privacy on mobile devices, a Fuzzy Logic based implicit authentication scheme is proposed in this paper. The proposed scheme computes an aggregate score based on selected features and a threshold in real-time based on current and historic data depicting user routine. The tuned fuzzy system is then applied to the aggregated score and the threshold to determine the trust level of the current user. The proposed fuzzy-integrated implicit authentication scheme is designed to: operate adaptively and completely in the background, require minimal trai...
Abstract. In an implicit authentication system, a user profile is used as an additional factor to st...
This work proposes a fuzzy multimodal technique capable of guaranteeing the desired level of securit...
In today’s digital communication era, people around the world can conveniently communicate with eac...
The file attached to this record is the author's final peer reviewed version. The Publisher's final ...
The file attached to this record is the author's final peer reviewed version. The Publisher's final ...
Abstract — One major disadvantage of mobile devices is their liability to theft. Since people make m...
In an implicit authentication system, a user profile is used as an additional factor to strengthen t...
In an implicit authentication system, a user profile is used as an additional factor to strengthen t...
Access controls ensure that all direct accesses to objects are authorized by means of user identific...
Implicit authentication schemes are a secondary authentica-tion mechanism that provides authenticati...
Abstract — since past few years there has been a remarkable rise in the popularity of touch screen m...
In this work, we proposed dynamic retraining (RU), wind vane module (WVM), BubbleMap (BMap), and rei...
Part 11: Privacy IIInternational audienceIn an implicit authentication system, a user profile is use...
Currently, the smartphone devices have become an essential part of our daily activities. Smartphone’...
Smartphones contain a wealth of personal and corporate data. Several surveys have reported that abou...
Abstract. In an implicit authentication system, a user profile is used as an additional factor to st...
This work proposes a fuzzy multimodal technique capable of guaranteeing the desired level of securit...
In today’s digital communication era, people around the world can conveniently communicate with eac...
The file attached to this record is the author's final peer reviewed version. The Publisher's final ...
The file attached to this record is the author's final peer reviewed version. The Publisher's final ...
Abstract — One major disadvantage of mobile devices is their liability to theft. Since people make m...
In an implicit authentication system, a user profile is used as an additional factor to strengthen t...
In an implicit authentication system, a user profile is used as an additional factor to strengthen t...
Access controls ensure that all direct accesses to objects are authorized by means of user identific...
Implicit authentication schemes are a secondary authentica-tion mechanism that provides authenticati...
Abstract — since past few years there has been a remarkable rise in the popularity of touch screen m...
In this work, we proposed dynamic retraining (RU), wind vane module (WVM), BubbleMap (BMap), and rei...
Part 11: Privacy IIInternational audienceIn an implicit authentication system, a user profile is use...
Currently, the smartphone devices have become an essential part of our daily activities. Smartphone’...
Smartphones contain a wealth of personal and corporate data. Several surveys have reported that abou...
Abstract. In an implicit authentication system, a user profile is used as an additional factor to st...
This work proposes a fuzzy multimodal technique capable of guaranteeing the desired level of securit...
In today’s digital communication era, people around the world can conveniently communicate with eac...