Smartphones are equipped with a set of sensors that describe the environment (e.g., GPS, noise, etc.) and their current status and usage (e.g., battery consumption, accelerometer readings, etc.). Several works have already addressed how to leverage such data for user-in-a-context continuous authentication, i.e., determining if the porting user is the authorized one and resides in his regular physical environment. This can be useful for an early reaction against robbery or impersonation. However, most previous works depend on assisted sensors, i.e., they rely upon immutable elements (e.g., cell towers, satellites, magnetism), thus being ineffective in their absence. Moreover, they focus on accuracy aspects, neglecting usability ones. For thi...
User authentication, the process of verifying the identity of a person who connects to important mob...
Continuous authentication systems have been proposed as a promising solution to authenticate users i...
Abstract—Modern mobile devices come with an array of sen-sors that support many interesting applicat...
Smartphones are equipped with a set of sensors that describe the environment (e.g., GPS, noise, etc....
Authenticating users in commercial smartphones is currently a naive process putting the smartphone ...
Authentication of smartphone users is important because a lot of sensitive data is stored in the sma...
Smartphones are now frequently used by end-users as the portals to cloud-based services, and smartph...
Smartphones are inescapable devices, which are becoming more and more intelligent and context-aware ...
Active authentication is the practice of continuously verifying the identity of users, based on thei...
Smartphones are context-aware devices that provide a compelling platform for ubiquitous computing an...
Smartphones are context-aware devices that provide a compelling platform for ubiquitous computing an...
Mobile devices are one of the most popular technologies in the world. Sales have increased yearly an...
Common smartphone authentication mechanisms (e.g., PINs, graphical passwords, and fingerprint scans)...
AbstractSmart phone stores a lot of important private information, so that user authentication is in...
Traditional explicit authentication mechanisms, in which the device remains unlocked after the intro...
User authentication, the process of verifying the identity of a person who connects to important mob...
Continuous authentication systems have been proposed as a promising solution to authenticate users i...
Abstract—Modern mobile devices come with an array of sen-sors that support many interesting applicat...
Smartphones are equipped with a set of sensors that describe the environment (e.g., GPS, noise, etc....
Authenticating users in commercial smartphones is currently a naive process putting the smartphone ...
Authentication of smartphone users is important because a lot of sensitive data is stored in the sma...
Smartphones are now frequently used by end-users as the portals to cloud-based services, and smartph...
Smartphones are inescapable devices, which are becoming more and more intelligent and context-aware ...
Active authentication is the practice of continuously verifying the identity of users, based on thei...
Smartphones are context-aware devices that provide a compelling platform for ubiquitous computing an...
Smartphones are context-aware devices that provide a compelling platform for ubiquitous computing an...
Mobile devices are one of the most popular technologies in the world. Sales have increased yearly an...
Common smartphone authentication mechanisms (e.g., PINs, graphical passwords, and fingerprint scans)...
AbstractSmart phone stores a lot of important private information, so that user authentication is in...
Traditional explicit authentication mechanisms, in which the device remains unlocked after the intro...
User authentication, the process of verifying the identity of a person who connects to important mob...
Continuous authentication systems have been proposed as a promising solution to authenticate users i...
Abstract—Modern mobile devices come with an array of sen-sors that support many interesting applicat...