Biometric authentication on mobile devices

LM Mayron - IEEE Security & Privacy, 2015 - computer.org
Biometric Authentication on Mobile Devices Toggle navigation IEEE Computer Society Digital
Library Jobs Tech News Resource Center Press Room Advertising About Us IEEE IEEE …

Privacy issues in the application of biometrics: A European perspective

M Rejman-Greene - Biometric Systems: Technology, Design and …, 2005 - Springer
Biometric methods of authentication offer a more secure link between a specific individual
and a non-human entity. Numerous trials and deployments demonstrate the wide range of …

IEDs on the Road to Fingerprint Authentication: Biometrics have vulnerabilities that PINs and passwords don't

G Paul, J Irvine - IEEE Consumer Electronics Magazine, 2016 - ieeexplore.ieee.org
Almost every 2016 flagship mobile phone, whether Android-or iOS-based, is set to come
with an integrated fingerprint reader. The benefits of fingerprint readers are clear to users …

From passwords to biometrics: In pursuit of a panacea

SM Furnell - Information Systems Security and Privacy: First …, 2015 - Springer
User authentication is a fundamental aspect of security, and a standard requirement on
many of the devices and services that people use on a daily basis. However, while a variety …

One-time biometrics for online banking and electronic payment authentication

A Plateaux, P Lacharme, A Jøsang… - … : IFIP WG 8.4, 8.9, TC 5 …, 2014 - Springer
Online banking and electronic payment systems on the Internet are becoming increasingly
advanced. On the machine level, transactions take place between client and server hosts …

Secure, usable and privacy-friendly user authentication from keystroke dynamics

K Halunen, V Vallivaara - Secure IT Systems: 21st Nordic Conference …, 2016 - Springer
User authentication is a key technology in human machine interaction. The need to establish
the legitimacy of transactions and possibly the actors behind them is crucial for trustworthy …

Enhancing security and privacy in biometrics-based authentication systems

NK Ratha, JH Connell, RM Bolle - IBM systems Journal, 2001 - ieeexplore.ieee.org
Because biometrics-based authentication offers several advantages over other
authentication methods, there has been a significant surge in the use of biometrics for user …

[图书][B] Mobile Authentication: Problems and Solutions

M Jakobsson - 2012 - books.google.com
Mobile Authentication: Problems and Solutions looks at human-to-machine authentication,
with a keen focus on the mobile scenario. Human-to-machine authentication is a startlingly …

[PDF][PDF] Poster: User preferences for biometric authentication methods and graded security on mobile phones

H Sieger, N Kirschnick, S Möller - Symposium on usability, privacy, and …, 2010 - Citeseer
Conventional protection on mobile phones provides only a one-time verification system
upon switch-on: unless locked, the device is always open; and automatic locking of the …

Biometrics: no silver bullets

S Furnell, N Clarke - Computer Fraud & Security, 2005 - Elsevier
With the onslaught of identity theft, the case for biometrics is gaining momentum. But they stil
have not gained significant commercial success. Implementations are still rare and the …