Mobile devices, particularly the touch screen mobile devices, are increasingly used to store and access private and sensitive data or services, and this has led to an increased demand for more secure and usable security services, one of which is user authentication. Currently, mobile device authentication services mainly use a knowledge-based method, e.g. a PIN-based authentication method, and, in some cases, a fingerprint-based authentication method is also supported. The knowledge-based method is vulnerable to impersonation attacks, while the fingerprint-based method can be unreliable sometimes. To overcome these limitations and to make the authentication service more secure and reliable for touch screen mobile device users, we have inves...
Robust user verification on mobile devices is one of the top priorities globally from a financial se...
Mobile devices, in the form of smartphones and tablet computers, are going through an amazing growth...
This paper focuses on how touch interactions on smartphones can provide a continuous user authentica...
Mobile devices, particularly the touch screen mobile devices, are increasingly used to store and acc...
© 2019 IEEE. Mobile devices are increasingly used to store private and sensitive data, and this has ...
The use of mobile devices has extended to all areas of human life and has changed the way people wor...
This is an accepted manuscript of an article published by Elsevier in Journal of Network and Compute...
The most commonly used system on desktop computers is a simple username and password approach which ...
When developing protection mechanisms of the confidential data on mobile devices, a balance of relia...
© 2016 Elsevier Ltd. All rights reserved. There have been research activities in the area of keystro...
Today, reliance on digital devices for daily routines has been shifted towards portable mobile devic...
With the booming of smart phone and high-speed wireless networks in recent years, applications and d...
Color poster with text and images.Modern user authentication measures on mobile devices often includ...
AbstractIn this work we investigated user authentication on mobile devices using touch behavior and ...
Common authentication mechanisms in mobile devices such as passwords and Personal Identification Num...
Robust user verification on mobile devices is one of the top priorities globally from a financial se...
Mobile devices, in the form of smartphones and tablet computers, are going through an amazing growth...
This paper focuses on how touch interactions on smartphones can provide a continuous user authentica...
Mobile devices, particularly the touch screen mobile devices, are increasingly used to store and acc...
© 2019 IEEE. Mobile devices are increasingly used to store private and sensitive data, and this has ...
The use of mobile devices has extended to all areas of human life and has changed the way people wor...
This is an accepted manuscript of an article published by Elsevier in Journal of Network and Compute...
The most commonly used system on desktop computers is a simple username and password approach which ...
When developing protection mechanisms of the confidential data on mobile devices, a balance of relia...
© 2016 Elsevier Ltd. All rights reserved. There have been research activities in the area of keystro...
Today, reliance on digital devices for daily routines has been shifted towards portable mobile devic...
With the booming of smart phone and high-speed wireless networks in recent years, applications and d...
Color poster with text and images.Modern user authentication measures on mobile devices often includ...
AbstractIn this work we investigated user authentication on mobile devices using touch behavior and ...
Common authentication mechanisms in mobile devices such as passwords and Personal Identification Num...
Robust user verification on mobile devices is one of the top priorities globally from a financial se...
Mobile devices, in the form of smartphones and tablet computers, are going through an amazing growth...
This paper focuses on how touch interactions on smartphones can provide a continuous user authentica...