This study introduces a novel authentication methodology; it is based on pattern recognition of fingers size and pressure when users touch smartphone screen. By analyzing diagrams of these touches and applying data mining for the first time as an authentication technique, this paper presents three new approaches. First, an exact-range evaluation approach has been verified that size is more recognition consistency than pressure. Second, a pattern-range is a new technique reliance on size frequency position. At last, using a size-range has been facilitated the login. The association rules have been modified to work on finger touchscreen data files. To login, 94.1111% of 18 authorized users are succeeded and 98.9% of 20 unauthorized users are ...
We investigate whether a classifier can continuously authenticate users based on the way they intera...
Due to recent advancements and appealing applications, the purchase rate of smart devices is increas...
Today, reliance on digital devices for daily routines has been shifted towards portable mobile devic...
This study introduces a novel authentication methodology; it is based on pattern recognition of fing...
AbstractIn this work we investigated user authentication on mobile devices using touch behavior and ...
With the increased popularity of touch screen mobile phones, touch gesture behavior is becoming more...
Among all the security technologies of smartphones, biometrics authentication technologies are on th...
With the booming of smart phone and high-speed wireless networks in recent years, applications and d...
Mobile devices, particularly the touch screen mobile devices, are increasingly used to store and acc...
Part 5: Privacy for Mobile ApplicationsInternational audienceThe use of mobile smart devices for sto...
Purpose– User authentication is generally used to protect personal information such as phone numbers...
In this article, we present a new user authentication technique for touchscreen-based smartphone use...
Abstract. The use of mobile smart devices for storing sensitive infor-mation and accessing online se...
Due to recent advancements and appealing applications, the purchase rate of smart devices is increas...
Abstract—Securing the sensitive data stored and accessed from mobile devices makes user authenticati...
We investigate whether a classifier can continuously authenticate users based on the way they intera...
Due to recent advancements and appealing applications, the purchase rate of smart devices is increas...
Today, reliance on digital devices for daily routines has been shifted towards portable mobile devic...
This study introduces a novel authentication methodology; it is based on pattern recognition of fing...
AbstractIn this work we investigated user authentication on mobile devices using touch behavior and ...
With the increased popularity of touch screen mobile phones, touch gesture behavior is becoming more...
Among all the security technologies of smartphones, biometrics authentication technologies are on th...
With the booming of smart phone and high-speed wireless networks in recent years, applications and d...
Mobile devices, particularly the touch screen mobile devices, are increasingly used to store and acc...
Part 5: Privacy for Mobile ApplicationsInternational audienceThe use of mobile smart devices for sto...
Purpose– User authentication is generally used to protect personal information such as phone numbers...
In this article, we present a new user authentication technique for touchscreen-based smartphone use...
Abstract. The use of mobile smart devices for storing sensitive infor-mation and accessing online se...
Due to recent advancements and appealing applications, the purchase rate of smart devices is increas...
Abstract—Securing the sensitive data stored and accessed from mobile devices makes user authenticati...
We investigate whether a classifier can continuously authenticate users based on the way they intera...
Due to recent advancements and appealing applications, the purchase rate of smart devices is increas...
Today, reliance on digital devices for daily routines has been shifted towards portable mobile devic...