A bio-signal based framework to secure mobile devices

P Kumar, R Saini, PP Roy, DP Dogra - Journal of Network and Computer …, 2017 - Elsevier
Nowadays, mobile devices are often equipped with high-end processing units and large
storage space. Mobile users usually store personal, official, and large amount of multimedia …

CEREBRE: A novel method for very high accuracy event-related potential biometric identification

MV Ruiz-Blondet, Z Jin, S Laszlo - IEEE Transactions on …, 2016 - ieeexplore.ieee.org
The vast majority of existing work on brain biometrics has been conducted on the ongoing
electroencephalogram. Here, we argue that the averaged event-related potential (ERP) may …

Undercover: authentication usable in front of prying eyes

H Sasamoto, N Christin, E Hayashi - Proceedings of the SIGCHI …, 2008 - dl.acm.org
A number of recent scams and security attacks (phishing, spyware, fake terminals,...) hinge
on a crook's ability to observe user behavior. In this paper, we describe the design …

A study of authentication in daily life

S Mare, M Baker, J Gummeson - … on usable privacy and security (SOUPS …, 2016 - usenix.org
We report on a wearable digital diary study of 26 participants that explores people's daily
authentication behavior across a wide range of targets (phones, PCs, websites, doors, cars …

Evaluating behavioral biometrics for continuous authentication: Challenges and metrics

S Eberz, KB Rasmussen, V Lenders… - … of the 2017 ACM on Asia …, 2017 - dl.acm.org
In recent years, behavioral biometrics have become a popular approach to support
continuous authentication systems. Most generally, a continuous authentication system can …

Vibrapass: secure authentication based on shared lies

A De Luca, E Von Zezschwitz, H Hußmann - Proceedings of the SIGCHI …, 2009 - dl.acm.org
Authentication in public spaces is a risky task. Frauds on cash machines (ATMs) are not
uncommon nowadays. The biggest group of attacks is observation attacks, which focus on …

Usable security: User preferences for authentication methods in eBanking and the effects of experience

CS Weir, G Douglas, T Richardson… - Interacting with …, 2010 - academic.oup.com
Multi-factor authentication involves the use of more than one mode in authentication
processes and is typically employed to increase security compared to a fixed password …

More than just good passwords? A study on usability and security perceptions of risk-based authentication

S Wiefling, M Dürmuth, L Lo Iacono - Proceedings of the 36th Annual …, 2020 - dl.acm.org
Risk-based Authentication (RBA) is an adaptive security measure to strengthen password-
based authentication. RBA monitors additional features during login, and when observed …

Biometric authentication on a mobile device: a study of user effort, error and task disruption

S Trewin, C Swart, L Koved, J Martino, K Singh… - Proceedings of the 28th …, 2012 - dl.acm.org
We examine three biometric authentication modalities--voice, face and gesture--as well as
password entry, on a mobile device, to explore the relative demands on user time, effort …

My password is here! An investigation into visuo-spatial authentication mechanisms

K Renaud, A De Angeli - Interacting with computers, 2004 - ieeexplore.ieee.org
Passwords are the almost universal authentication mechanism, even though they are
basically flawed and cause problems for users due to poor memorability. Graphical methods …