Biometric modalities based on human behavior are now seen as a solution to many of the tradition problems of authentication methods such as the PIN lock mechanism. In this work, we consider context-aware authentication based on three behavioral biometric modalities: gait, touch and keystroke. With respect to the gait modality, this work shows that through a combination of supervised learning methods and statistical tests, it is possible to use information on how a phone is held (in a hand or pocket) to improve classification performance drastically. We propose a two-stage authentication framework that identifies the location of the phone before performing authentication, and show its benefits based on a dataset of 30 users. With respect to ...
Mobile devices, particularly the touch screen mobile devices, are increasingly used to store and acc...
The most commonly used system on desktop computers is a simple username and password approach which ...
Pervasive in nature and extensively used for a wide range of features, smartphone provides functiona...
Biometric modalities based on human behavior are now seen as a solution to many of the tradition pro...
Abstract This work investigates how context should be taken into account when performing continuous...
AbstractIn this work we investigated user authentication on mobile devices using touch behavior and ...
User authentication is a means of identifying the user and verifying that the user is allowed access...
Mobile devices have become an important part of our everyday life, harvesting more and more confiden...
We investigate whether a classifier can continuously authenticate users based on the way they intera...
Abstract: Smartphones have become the standard personal device to store private or sensitive informa...
Current mobile user authentication systems based on PIN codes, fingerprint, and face recognition hav...
Smartphones are arguably candidates to become the platform of choice for ubiquitous biometric-based ...
Authentication of smartphone users is important because a lot of sensitive data is stored in the sma...
Mobile devices are increasingly used to store private and sensitive data, and this has led to an i...
AbstractWith the privilege of using mobile devices it is crucial to protect Smartphones by authentic...
Mobile devices, particularly the touch screen mobile devices, are increasingly used to store and acc...
The most commonly used system on desktop computers is a simple username and password approach which ...
Pervasive in nature and extensively used for a wide range of features, smartphone provides functiona...
Biometric modalities based on human behavior are now seen as a solution to many of the tradition pro...
Abstract This work investigates how context should be taken into account when performing continuous...
AbstractIn this work we investigated user authentication on mobile devices using touch behavior and ...
User authentication is a means of identifying the user and verifying that the user is allowed access...
Mobile devices have become an important part of our everyday life, harvesting more and more confiden...
We investigate whether a classifier can continuously authenticate users based on the way they intera...
Abstract: Smartphones have become the standard personal device to store private or sensitive informa...
Current mobile user authentication systems based on PIN codes, fingerprint, and face recognition hav...
Smartphones are arguably candidates to become the platform of choice for ubiquitous biometric-based ...
Authentication of smartphone users is important because a lot of sensitive data is stored in the sma...
Mobile devices are increasingly used to store private and sensitive data, and this has led to an i...
AbstractWith the privilege of using mobile devices it is crucial to protect Smartphones by authentic...
Mobile devices, particularly the touch screen mobile devices, are increasingly used to store and acc...
The most commonly used system on desktop computers is a simple username and password approach which ...
Pervasive in nature and extensively used for a wide range of features, smartphone provides functiona...