Mind how you answer me! Transparently authenticating the user of a smartphone when answering or placing a call

M Conti, I Zachia-Zlatea, B Crispo - … of the 6th ACM symposium on …, 2011 - dl.acm.org
In this paper we propose a new biometric measure to authenticate the user of a smartphone:
the movement the user performs when answering (or placing) a phone call. The biometric …

A framework for continuous, transparent mobile device authentication

H Crawford, K Renaud, T Storer - Computers & Security, 2013 - Elsevier
We address two distinct problems with de facto mobile device authentication, as provided by
a password or sketch. Firstly, device activity is permitted on an all-or-nothing basis …

[HTML][HTML] Understanding user perceptions of transparent authentication on a mobile device

H Crawford, K Renaud - Journal of Trust Management, 2014 - Springer
Abstract Due to the frequency with which smartphone owners use their devices, effortful
authentication methods such as passwords and PINs are not an effective choice for …

Progressive authentication: deciding when to authenticate on mobile phones

O Riva, C Qin, K Strauss… - 21st USENIX Security …, 2012 - usenix.org
Mobile users are often faced with a trade-off between security and convenience. Either users
do not use any security lock and risk compromising their data, or they use security locks but …

[PDF][PDF] Implicit authentication for mobile devices

M Jakobsson, E Shi, P Golle, R Chow - Proceedings of the 4th USENIX …, 2009 - usenix.org
We introduce the notion of implicit authentication–the ability to authenticate mobile users
based on actions they would carry out anyway. We develop a model for how to perform …

Context-aware active authentication using smartphone accelerometer measurements

A Primo, VV Phoha, R Kumar… - Proceedings of the IEEE …, 2014 - cv-foundation.org
While body movement patterns recorded by a smartphone accelerometer are now well
understood to be discriminative enough to separate users, little work has been done to …

Dialerauth: A motion-assisted touch-based smartphone user authentication scheme

A Buriro, B Crispo, S Gupta, F Del Frari - Proceedings of the eighth ACM …, 2018 - dl.acm.org
This paper introduces DIALERAUTH-a mechanism which leverages the way a smartphone
user taps/enters any text-independent 10-digit number (replicating the dialing process) and …

Waving authentication: your smartphone authenticate you on motion gesture

F Hong, M Wei, S You, Y Feng, Z Guo - Proceedings of the 33rd annual …, 2015 - dl.acm.org
User authentication is important to protect sensitive and private information for smartphone
users. We propose Waving Authentication (WA) which is a motion gesture authentication …

Continuous authentication on mobile devices by analysis of typing motion behavior

H Gascon, S Uellenbeck, C Wolf, K Rieck - 2014 - dl.gi.de
Smartphones have become the standard personal device to store private or sensitive
information. Widely used as every day gadget, however, they are susceptible to get lost or …

I feel like I'm taking selfies all day! Towards understanding biometric authentication on smartphones

A De Luca, A Hang, E Von Zezschwitz… - Proceedings of the 33rd …, 2015 - dl.acm.org
We present the results of an MTurk survey (n= 383) on the reasons for using and not using
biometric authentication systems on smartphones. We focused on Apple's Touch ID as well …