Casa: context-aware scalable authentication

E Hayashi, S Das, S Amini, J Hong… - Proceedings of the Ninth …, 2013 - dl.acm.org
We introduce context-aware scalable authentication (CASA) as a way of balancing security
and usability for authentication. Our core idea is to choose an appropriate form of active …

SmartAuth: dynamic context fingerprinting for continuous user authentication

D Preuveneers, W Joosen - Proceedings of the 30th annual ACM …, 2015 - dl.acm.org
As recent incidents have shown, weak passwords are a severe security risk for
authenticating users and granting access to protected resources. Additionally, strong …

A context-aware authentication framework for smart homes

Y Ashibani, D Kauling… - 2017 IEEE 30th Canadian …, 2017 - ieeexplore.ieee.org
There has been a recent rapid increase in the number of Internet of Things (IoT) devices,
providing a wide range of services for smart homes such as surveillance cameras, smart …

Location-enhanced authentication using the IoT: Because you cannot be in two places at once

I Agadakos, P Hallgren, D Damopoulos… - Proceedings of the …, 2016 - dl.acm.org
User location can act as an additional factor of authentication in scenarios where physical
presence is required, such as when making in-person purchases or unlocking a vehicle …

Context-aware user authentication–supporting proximity-based login in pervasive computing

JE Bardram, RE Kjær, MØ Pedersen - … , Seattle, WA, USA, October 12-15 …, 2003 - Springer
This paper explores computer security in pervasive computing with focus on user
authentication. We present the concept of Proximity-Based User Authentication, as a …

Progressive authentication: deciding when to authenticate on mobile phones

O Riva, C Qin, K Strauss… - 21st USENIX Security …, 2012 - usenix.org
Mobile users are often faced with a trade-off between security and convenience. Either users
do not use any security lock and risk compromising their data, or they use security locks but …

Design and implementation of a contextual-based continuous authentication framework for smart homes

Y Ashibani, D Kauling, QH Mahmoud - Applied System Innovation, 2019 - mdpi.com
There has been a rapid increase in the number of Internet of Things (IoT) devices in the last
few years, providing a wide range of services such as camera feeds, light controls, and door …

Usability and security evaluation of GeoPass: a geographic location-password scheme

J Thorpe, B MacRae, A Salehi-Abari - … of the Ninth symposium on usable …, 2013 - dl.acm.org
We design, implement, and evaluate GeoPass: an interface for digital map-based
authentication where a user chooses a place as his or her password (ie, a" location …

[PDF][PDF] Implicit authentication for mobile devices

M Jakobsson, E Shi, P Golle, R Chow - Proceedings of the 4th USENIX …, 2009 - usenix.org
We introduce the notion of implicit authentication–the ability to authenticate mobile users
based on actions they would carry out anyway. We develop a model for how to perform …

Proximity-proof: Secure and usable mobile two-factor authentication

D Han, Y Chen, T Li, R Zhang, Y Zhang… - Proceedings of the 24th …, 2018 - dl.acm.org
Mobile two-factor authentication (2FA) has become commonplace along with the popularity
of mobile devices. Current mobile 2FA solutions all require some form of user effort which …