User authentication on mobile devices: Approaches, threats and trends

C Wang, Y Wang, Y Chen, H Liu, J Liu - Computer Networks, 2020 - Elsevier
… We envision that the future trend of user authentication on mobile devices is towards the
two/multi-factor authentication by fusing the multiple authentication metrics organically. …

Continuous user authentication on mobile devices: Recent progress and remaining challenges

VM Patel, R Chellappa, D Chandra… - IEEE Signal …, 2016 - ieeexplore.ieee.org
mobile device. In this article, we provide an overview of different continuous authentication
methods on mobile … Introduction Traditional methods for authenticating users on mobile devic…

Advanced user authentication for mobile devices

NL Clarke, SM Furnell - computers & security, 2007 - Elsevier
… such biometric upon a mobile handset. The study looks into authenticating users by the way
in … Given the wide variety of mobile devices that exist, with different hardware configurations …

An effective approach for authentication of mobile users

N El-Fishway, M Nofal, A Tadros - … Conference. IEEE 55th …, 2002 - ieeexplore.ieee.org
… next generation of mobile communication system users will be … a new protocol for
authentication of mobile users. The main … a robust authentication protocol for mobile users. The …

Authentication in the clouds: a framework and its application to mobile users

R Chow, M Jakobsson, R Masuoka, J Molina… - Proceedings of the …, 2010 - dl.acm.org
… usable and strong authentication on mobile devices have … the integration of various
authentication methods. We call this … whether the client device is a mobile phone or not. Given the …

Surveying the development of biometric user authentication on mobile phones

W Meng, DS Wong, S Furnell… - … Surveys & Tutorials, 2014 - ieeexplore.ieee.org
user authentication techniques on mobile phones according to physiological and behavioral
approaches. We specifically introduce up to eleven biometric authenticationmobile phones. …

Authentication of mobile users

R Molva, D Samfat, G Tsudik - IEEE Network, 1994 - ieeexplore.ieee.org
… domain, we assume the mobile user is authenticated with a traditional server-based
authentication mechanism, eg. Kerberos [16] or KryptoKnight [ 171. Users of every network domain …

[PDF][PDF] Perceptions of user authentication on mobile devices

S Karatzouni, SM Furnell, NL Clarke… - Proceedings of the …, 2007 - Citeseer
… All of the participants were regular end-users of mobile devices, and in many cases … on
user authentication. A list of the question as well as a brief justification behind them follows. …

Awase-E: Image-based authentication for mobile phones using user's favorite images

T Takada, H Koike - … 5th International Symposium, Mobile HCI 2003, Udine …, 2003 - Springer
… commerce and mobile banking. This paper proposes a novel authentication method for a
mobile phone … We assume that it will be used with a mobile phone with a digital camera. It uses …

Two factor authentication using mobile phones

F Aloul, S Zahidi, W El-Hajj - 2009 IEEE/ACS international …, 2009 - ieeexplore.ieee.org
… defined period of time and is generated by factors that are unique to both, the user and
the mobile device itself. Additionally, an SMS-based mechanism is implemented as both a …