Who Are You? It Depends (On What You Ask {Me!)}:{Context-Dependent} Dynamic User Authentication

RV Sampangi, K Hawkey - Twelfth Symposium on Usable Privacy and …, 2016 - usenix.org
In this position paper, we present a new mechanism for contextdependent user
authentication. We propose an approach in which the type of authentication (single/two …

Context-aware systems and adaptive user authentication

K Halunen, A Evesti - International Joint Conference on Ambient …, 2013 - Springer
In this paper we discuss the possibilities of context-aware systems in providing more secure
user authentication. We describe some approaches in using context information in adaptive …

Context-aware authentication framework

D Goel, E Kher, S Joag, V Mujumdar, M Griss… - … Conference on Mobile …, 2009 - Springer
We present an extensible context-aware authentication framework which can adapt to the
contextual information available in a smart environment. Having confidence in a user's …

Casa: context-aware scalable authentication

E Hayashi, S Das, S Amini, J Hong… - Proceedings of the Ninth …, 2013 - dl.acm.org
We introduce context-aware scalable authentication (CASA) as a way of balancing security
and usability for authentication. Our core idea is to choose an appropriate form of active …

Context sensitive adaptive authentication

RJ Hulsebosch, MS Bargh, G Lenzini… - Smart Sensing and …, 2007 - Springer
We exploit the ability to sense and use context information to augment or replace the
traditional static security measures by making them more adaptable to a given context and …

i/k-contact: A context-aware user authentication using physical social trust

S Arimura, M Fujita, S Kobayashi, J Kani… - 2014 Twelfth Annual …, 2014 - ieeexplore.ieee.org
In recent years, with growing demands towards big data application, various research on
context-awareness has once again become active. This paper proposes a new type of …

When context is better than identity: authentication by context using empirical channels

B Chen, LH Nguyen, AW Roscoe - … , Cambridge, UK, March 28-30, 2011 …, 2011 - Springer
In mobile computing applications the traditional name-based concept of identity is both
difficult to support and frequently inappropriate. The natural alternative is to use the context …

Context sensitive access control

RJ Hulsebosch, AH Salden, MS Bargh… - Proceedings of the …, 2005 - dl.acm.org
We investigate the practical feasibility of using context information for controlling access to
services. Based solely on situational context, we show that users can be transparently …

[PDF][PDF] PACCo: Privacy-friendly Access Control with Context.

A Put, B De Decker - SECRYPT, 2016 - academia.edu
We propose a secure and privacy friendly way to strengthen authentication mechanisms of
online services by taking context into account. The use of context, however, is often of a …

An authentication approach based on behavioral profiles

JCD Lima, CC Rocha… - 5th Iberian Conference on …, 2010 - ieeexplore.ieee.org
Mobile devices are becoming mandatory equipment in modern life. However, the available
interfaces are usually not suitable for accepting data input in a friendly and reliable fashion …