Part 5: Privacy for Mobile ApplicationsInternational audienceThe use of mobile smart devices for storing sensitive information and accessing online services is increasing. At the same time, methods for authenticating users into their devices and online services that are not only secure, but also privacy and user-friendly are needed. In this paper, we present our initial explorations of the use of lock pattern dynamics as a secure and user-friendly two-factor authentication method. We developed an application for the Android mobile platform to collect data on the way individuals draw lock patterns on a touchscreen. Using a Random Forest machine learning classifier this method achieves an average Equal Error Rate (EER) of approximately 10.39%...
We investigate whether a classifier can continuously authenticate users based on the way they intera...
Pattern Unlock is one in a family of graphical passwords used on smart mobile devices. They were pro...
Abstract: Smartphones have become the standard personal device to store private or sensitive informa...
Part 5: Privacy for Mobile ApplicationsInternational audienceThe use of mobile smart devices for sto...
Abstract. The use of mobile smart devices for storing sensitive infor-mation and accessing online se...
To protect an Android smartphone against attackers, a lock pattern can be used. Nevertheless, should...
To protect an Android smartphone against attackers, a lock pattern can be used. Nevertheless, should...
In this technological era where smartphone use continues to increase, it is essential to secure user...
Abstract. Mobile devices have become an important part of our every-day life, harvesting more and mo...
With the increased use of Android smartphones, the Android Pattern Lock graphical password has becom...
AbstractIn this work we investigated user authentication on mobile devices using touch behavior and ...
This study introduces a novel authentication methodology; it is based on pattern recognition of fing...
With the increased popularity of touch screen mobile phones, touch gesture behavior is becoming more...
Mobile devices, particularly the touch screen mobile devices, are increasingly used to store and acc...
Pervasive in nature and extensively used for a wide range of features, smartphone provides functiona...
We investigate whether a classifier can continuously authenticate users based on the way they intera...
Pattern Unlock is one in a family of graphical passwords used on smart mobile devices. They were pro...
Abstract: Smartphones have become the standard personal device to store private or sensitive informa...
Part 5: Privacy for Mobile ApplicationsInternational audienceThe use of mobile smart devices for sto...
Abstract. The use of mobile smart devices for storing sensitive infor-mation and accessing online se...
To protect an Android smartphone against attackers, a lock pattern can be used. Nevertheless, should...
To protect an Android smartphone against attackers, a lock pattern can be used. Nevertheless, should...
In this technological era where smartphone use continues to increase, it is essential to secure user...
Abstract. Mobile devices have become an important part of our every-day life, harvesting more and mo...
With the increased use of Android smartphones, the Android Pattern Lock graphical password has becom...
AbstractIn this work we investigated user authentication on mobile devices using touch behavior and ...
This study introduces a novel authentication methodology; it is based on pattern recognition of fing...
With the increased popularity of touch screen mobile phones, touch gesture behavior is becoming more...
Mobile devices, particularly the touch screen mobile devices, are increasingly used to store and acc...
Pervasive in nature and extensively used for a wide range of features, smartphone provides functiona...
We investigate whether a classifier can continuously authenticate users based on the way they intera...
Pattern Unlock is one in a family of graphical passwords used on smart mobile devices. They were pro...
Abstract: Smartphones have become the standard personal device to store private or sensitive informa...