With the increasing popularity of smartphones and its audience including children as young as 2 year old, smartphones can be a hazard for young children in terms of health concerns, time wastage, viewing of inappropriate material and conversely children who are too young can be a threat to the smartphone as well e.g, causing battery drainage, making unwanted calls/text messages, doing physical damage etc. In order to protect the smartphone and children from each other, we require user identification on our devices so the device could perform certain functions for instance restricting adult content once a user is identified as a child. This paper is a user study that aims at detecting the touch patterns of adults and children. To this end we...
Swipe-gestures are by far the most common way to interact with mobile devices such as phones, tablet...
Children under 3 are enthusiastic users of mobile devices and have the ability to emulate a number o...
Rapid advancement in computing technology brings computers and humans to be seamlessly integrated in...
This paper studies user classification into children and adults according to their interaction with ...
In this paper we investigated the possibility of classifying users’ age-group using gesture-based fe...
The growth of Internet and the pervasiveness of ICT have led to a radical change in social relations...
Vast majority of modern smartphones is equipped with touch-sensitive screens. Being precise and accu...
The touch-screen revolution is not restricted to adults only. Parents find games and educational app...
Abstract. Due to the powerful sensors incorporated, the new generations of smartphones have become c...
Common authentication mechanisms in mobile devices such as passwords and Personal Identification Num...
AbstractThe growth of Internet and the pervasiveness of ICT have led to a radical change in social r...
AbstractIn this work we investigated user authentication on mobile devices using touch behavior and ...
The main subject of this work was to find a new way of user identification based on his interactions...
With the increased popularity of touch screen mobile phones, touch gesture behavior is becoming more...
AbstractWith the privilege of using mobile devices it is crucial to protect Smartphones by authentic...
Swipe-gestures are by far the most common way to interact with mobile devices such as phones, tablet...
Children under 3 are enthusiastic users of mobile devices and have the ability to emulate a number o...
Rapid advancement in computing technology brings computers and humans to be seamlessly integrated in...
This paper studies user classification into children and adults according to their interaction with ...
In this paper we investigated the possibility of classifying users’ age-group using gesture-based fe...
The growth of Internet and the pervasiveness of ICT have led to a radical change in social relations...
Vast majority of modern smartphones is equipped with touch-sensitive screens. Being precise and accu...
The touch-screen revolution is not restricted to adults only. Parents find games and educational app...
Abstract. Due to the powerful sensors incorporated, the new generations of smartphones have become c...
Common authentication mechanisms in mobile devices such as passwords and Personal Identification Num...
AbstractThe growth of Internet and the pervasiveness of ICT have led to a radical change in social r...
AbstractIn this work we investigated user authentication on mobile devices using touch behavior and ...
The main subject of this work was to find a new way of user identification based on his interactions...
With the increased popularity of touch screen mobile phones, touch gesture behavior is becoming more...
AbstractWith the privilege of using mobile devices it is crucial to protect Smartphones by authentic...
Swipe-gestures are by far the most common way to interact with mobile devices such as phones, tablet...
Children under 3 are enthusiastic users of mobile devices and have the ability to emulate a number o...
Rapid advancement in computing technology brings computers and humans to be seamlessly integrated in...