Smartphones are now frequently used by end-users as the portals to cloud-based services, and smartphones are easily stolen or co-opted by an attacker. Beyond the initial login mechanism, it is highly desirable to re-authenticate endusers who are continuing to access security-critical services and data, whether in the cloud or in the smartphone. But attackers who have gained access to a logged-in smartphone have no incentive to re-authenticate, so this must be done in an automatic, non-bypassable way. Hence, this paper proposes a novel authentication system, iAuth, for implicit, continuous authentication of the end-user based on his or her behavioral characteristics, by leveraging the sensors already ubiquitously built into smartphones. We d...
Current smartphone security techniques offer less reliability. As an instance, personal identificati...
Abstract: Smartphones have become the standard personal device to store private or sensitive informa...
Over the past decade, machine learning methods have found their way into a large variety of computer...
Authentication of smartphone users is important because a lot of sensitive data is stored in the sma...
The widespread use of smartphones gives rise to new security and privacy concerns. Smartphone thefts...
Abstract — One major disadvantage of mobile devices is their liability to theft. Since people make m...
Smartphones are context-aware devices that provide a compelling platform for ubiquitous computing an...
Smartphones are context-aware devices that provide a compelling platform for ubiquitous computing an...
Smartphones are equipped with a set of sensors that describe the environment (e.g., GPS, noise, etc....
Smartphones are context-aware devices that provide a compelling platform for ubiquitous computing an...
Implicit authentication schemes are a secondary authentica-tion mechanism that provides authenticati...
The conventional authentication methods, such as password authentication, fingerprint recognition an...
The widespread usage of smartphones gives rise to new security and privacy concerns. Smartphones are...
The growth in smartphone usage has led to increased user concerns regarding privacy and security. Sm...
Most authentication systems (password and biometric feature based) use one-time static authenticatio...
Current smartphone security techniques offer less reliability. As an instance, personal identificati...
Abstract: Smartphones have become the standard personal device to store private or sensitive informa...
Over the past decade, machine learning methods have found their way into a large variety of computer...
Authentication of smartphone users is important because a lot of sensitive data is stored in the sma...
The widespread use of smartphones gives rise to new security and privacy concerns. Smartphone thefts...
Abstract — One major disadvantage of mobile devices is their liability to theft. Since people make m...
Smartphones are context-aware devices that provide a compelling platform for ubiquitous computing an...
Smartphones are context-aware devices that provide a compelling platform for ubiquitous computing an...
Smartphones are equipped with a set of sensors that describe the environment (e.g., GPS, noise, etc....
Smartphones are context-aware devices that provide a compelling platform for ubiquitous computing an...
Implicit authentication schemes are a secondary authentica-tion mechanism that provides authenticati...
The conventional authentication methods, such as password authentication, fingerprint recognition an...
The widespread usage of smartphones gives rise to new security and privacy concerns. Smartphones are...
The growth in smartphone usage has led to increased user concerns regarding privacy and security. Sm...
Most authentication systems (password and biometric feature based) use one-time static authenticatio...
Current smartphone security techniques offer less reliability. As an instance, personal identificati...
Abstract: Smartphones have become the standard personal device to store private or sensitive informa...
Over the past decade, machine learning methods have found their way into a large variety of computer...