At the present time, mobile devices such as tablet-type PCs and smart phones have widely penetrated into our daily lives. Therefore, an authentication method that prevents shoulder surfing is needed. We are investigating a new user authentication method for mobile devices that uses surface electromyogram (s-EMG) signals, not screen touching. The s-EMG signals, which are generated by the electrical activity of muscle fibers during contraction, are detected over the skin surface. Muscle movement can be differentiated by analyzing the s-EMG. In this paper, a series of experiments was carried out to investigate the prospect of an authentication method using s-EMGs. Specifically, several gestures of the wrist were introduced, and the s-EMGs gene...
Among all the security technologies of smartphones, biometrics authentication technologies are on th...
Abstract. We study the feasibility of leveraging the sensors embedded on mo-bile devices to enable a...
Mobile devices offer their users lots of possibilities and a feeling of freedom. However, this free-...
Screen lock is a critical security feature for smart-phones to prevent unauthorized access. Although...
Screen lock is a critical security feature for smartphones to prevent unauthorized access. Although ...
With the booming of smart phone and high-speed wireless networks in recent years, applications and d...
AbstractIn this work we investigated user authentication on mobile devices using touch behavior and ...
Mobile devices users are storing more and more private and often highly sensitive information on the...
Purpose– User authentication is generally used to protect personal information such as phone numbers...
In order to use mobile devices safely, many researchers have worked on topics related to mobile secu...
Abstract: Smartphones have become the standard personal device to store private or sensitive informa...
Due to commoditization and convenience, wearable technology are interwoven with our daily life. Howe...
We propose a new approach for authenticating users of mo-bile devices that is based on analyzing the...
INRIA Lille-Nord Europe : plate-forme Grid'5000International audienceWe present HoldPass, the first ...
Mobile devices, particularly the touch screen mobile devices, are increasingly used to store and acc...
Among all the security technologies of smartphones, biometrics authentication technologies are on th...
Abstract. We study the feasibility of leveraging the sensors embedded on mo-bile devices to enable a...
Mobile devices offer their users lots of possibilities and a feeling of freedom. However, this free-...
Screen lock is a critical security feature for smart-phones to prevent unauthorized access. Although...
Screen lock is a critical security feature for smartphones to prevent unauthorized access. Although ...
With the booming of smart phone and high-speed wireless networks in recent years, applications and d...
AbstractIn this work we investigated user authentication on mobile devices using touch behavior and ...
Mobile devices users are storing more and more private and often highly sensitive information on the...
Purpose– User authentication is generally used to protect personal information such as phone numbers...
In order to use mobile devices safely, many researchers have worked on topics related to mobile secu...
Abstract: Smartphones have become the standard personal device to store private or sensitive informa...
Due to commoditization and convenience, wearable technology are interwoven with our daily life. Howe...
We propose a new approach for authenticating users of mo-bile devices that is based on analyzing the...
INRIA Lille-Nord Europe : plate-forme Grid'5000International audienceWe present HoldPass, the first ...
Mobile devices, particularly the touch screen mobile devices, are increasingly used to store and acc...
Among all the security technologies of smartphones, biometrics authentication technologies are on th...
Abstract. We study the feasibility of leveraging the sensors embedded on mo-bile devices to enable a...
Mobile devices offer their users lots of possibilities and a feeling of freedom. However, this free-...