Screen locking/unlocking is important for modern smart phones to avoid the unintentional operations and secure the personal stuff. Once the phone is locked, the user should take a specific action or provide some secret information to unlock the phone. The existing unlocking approaches can be categorized into four groups: motion, password, pattern, and fingerprint. Existing approaches do not support smart phones well due to the deficiency of security, high cost, and poor usability. We collect 200 users' handwaving actions with their smart phones and discover an appealing observation: the waving pattern of a person is kind of unique, stable and distinguishable. In this paper, we propose OpenSesame, which employs the users' waving patterns for...
Pervasive in nature and extensively used for a wide range of features, smartphone provides functiona...
This study introduces a novel authentication methodology; it is based on pattern recognition of fing...
The widespread use of small, mobile computing devices such as smartphones increases the need to prot...
Part 5: Privacy for Mobile ApplicationsInternational audienceThe use of mobile smart devices for sto...
Abstract: Smartphones have become the standard personal device to store private or sensitive informa...
Abstract. The use of mobile smart devices for storing sensitive infor-mation and accessing online se...
An immense amount of private information is stored in smartphones. In order to secure information fr...
Pattern Unlock is one in a family of graphical passwords used on smart mobile devices. They were pro...
Screen lock is a critical security feature for smartphones to prevent unauthorized access. Although ...
Screen lock is a critical security feature for smart-phones to prevent unauthorized access. Although...
Smartphone's are extremely popular and in high demand nowadays. They are easy to handle and very int...
© 2018 Elsevier Ltd In this paper, we present a behavioral biometric-based smartphone user authentic...
The widespread usage of smartphones gives rise to new security and privacy concerns. Smartphones are...
The usage of mobile phones has increased multi-fold in recent decades, mostly because of their utili...
Mobile devices have become an important part of our everyday life, harvesting more and more confiden...
Pervasive in nature and extensively used for a wide range of features, smartphone provides functiona...
This study introduces a novel authentication methodology; it is based on pattern recognition of fing...
The widespread use of small, mobile computing devices such as smartphones increases the need to prot...
Part 5: Privacy for Mobile ApplicationsInternational audienceThe use of mobile smart devices for sto...
Abstract: Smartphones have become the standard personal device to store private or sensitive informa...
Abstract. The use of mobile smart devices for storing sensitive infor-mation and accessing online se...
An immense amount of private information is stored in smartphones. In order to secure information fr...
Pattern Unlock is one in a family of graphical passwords used on smart mobile devices. They were pro...
Screen lock is a critical security feature for smartphones to prevent unauthorized access. Although ...
Screen lock is a critical security feature for smart-phones to prevent unauthorized access. Although...
Smartphone's are extremely popular and in high demand nowadays. They are easy to handle and very int...
© 2018 Elsevier Ltd In this paper, we present a behavioral biometric-based smartphone user authentic...
The widespread usage of smartphones gives rise to new security and privacy concerns. Smartphones are...
The usage of mobile phones has increased multi-fold in recent decades, mostly because of their utili...
Mobile devices have become an important part of our everyday life, harvesting more and more confiden...
Pervasive in nature and extensively used for a wide range of features, smartphone provides functiona...
This study introduces a novel authentication methodology; it is based on pattern recognition of fing...
The widespread use of small, mobile computing devices such as smartphones increases the need to prot...