Behavioral biometrics for mobile user authentication: benefits and limitations

M Papaioannou, G Mantas… - 2023 IFIP …, 2023 - ieeexplore.ieee.org
… Consequently, experts in the security field are now focusing more on user authentication
the benefits, as well as the limitations of behavioral biometrics for mobile user authentication in …

A review on authentication methods

SZS Idrus, E Cherrier, C Rosenberger… - Australian Journal of …, 2013 - hal.science
authenticate a user is sometimes related as a strong authentication, but the strength of the
authentication … We also elaborate further about their use, limitations and potential benefits, and …

Comprehensive survey: Biometric user authentication application, evaluation, and discussion

R Alrawili, AAS AlQahtani, MK Khan - Computers and Electrical …, 2024 - Elsevier
… review of the literature on biometric user authentication, encompassing an analysis of
key … and behavioral traits, assessing their benefits and limitations. We also examine the …

Recent trends in user authentication–a survey

SW Shah, SS Kanhere - IEEE access, 2019 - ieeexplore.ieee.org
User authentication, ie, a procedure to verify the identity of the user, is essential in the digital
… Researchers thus have proposed numerous new mechanisms to authenticate the users in …

A survey on user authentication factors

AAS AlQahtani, Z El-Awadi… - 2021 IEEE 12th Annual …, 2021 - ieeexplore.ieee.org
… In [44], the authors provided a comprehensive summary of the benefits of phone-based …
using the suggested benefits to analyze more approaches to authentication. The benefits in each …

[图书][B] Advances in user authentication

D Dasgupta, A Roy, A Nag - 2017 - Springer
… the basic authentication mechanism for identifying and authorizing legitimate users to
computing systems and denying the use by others. It narrates different authentication categories, …

An overview of the present and future of user authentication

MA Al Kabir, W Elmedany - 2022 4th IEEE Middle East and …, 2022 - ieeexplore.ieee.org
… based authentication still remains as one of the most dominant ways of verifying a user's
identity… -factor and adaptive risk-based authentication schemes that have been adopted over the …

User authentication schemes for wireless sensor networks: A review

S Kumari, MK Khan, M Atiquzzaman - Ad Hoc Networks, 2015 - Elsevier
… secure and dependable user authentication mechanisms. … features that a reliable user
authentication scheme for WSNs … , node capture attack and user impersonation attack. There is …

Costs and benefits of authentication advice

H Murray, D Malone - ACM Transactions on Privacy and Security, 2023 - dl.acm.org
… We provide a methodology for organisations to assess which authentication advice to
follow, and we provide an assessment of current advice that demonstrates to end-users which …

Using Personal Data to Support Authentication: User Attitudes and Suitability

J Bonner, J O'Hagan, F Mathis, J Ferguson… - Proceedings of the 20th …, 2021 - dl.acm.org
… We discuss the benefits and drawbacks of using personal data as a source of dynamic … to
support user authentication on a more theoretical level and aim to understand users’ attitudes …