User authentication acts as the first line of defense verifying the identity of a mobile user, often as a prerequisite to allow access to resources in a mobile device. For several decades …
H Zhang, D Singh, X Li - 2019 - scholarspace.manoa.hawaii.edu
Behavioral biometrics, being non-intrusive and cost-efficient, have the potential to assist user identification and authentication. However, user behaviors can vary significantly for …
P Kałużny - Business Information Systems Workshops: BIS 2018 …, 2019 - Springer
This paper presents an overview on the possible use of behavioral biometrics methods in mobile banking and payment applications. As mobile applications became more common …
W Meng, D S. Wong, LF Kwok - Information Management & Computer …, 2014 - emerald.com
Purpose–This paper aims to design a compact scheme of behavioural biometric-based user authentication, develop an adaptive mechanism that selects an appropriate classifier in an …
Pervasive in nature and extensively used for a wide range of features, smartphone provides functionality such as social networking, online shopping, mobile gaming, private/group …
NA Mahadi, MA Mohamed, AI Mohamad… - Recent Advances in …, 2018 - books.google.com
Authentication is a way to enable an individual to be uniquely identified usually based on passwords and personal identification number (PIN). The main problems of such …
The increasing number of mobile devices in recent years has caused the collection of a large amount of personal information that needs to be protected. To this aim, behavioural …
This paper describes the experimental framework and results of the IJCB 2022 Mobile Behavioral Biometrics Competition (MobileB2C). The aim of MobileB2C is bench-marking …
A Buriro, S Ceol - Proceedings of the 28th ACM Symposium on Access …, 2023 - dl.acm.org
In this demo paper, we introduce MBBS-a tetra-model behavioral biometric authentication scheme for smartphones. MBBS leverages four modalities: the way a smartphone user (i) …