Z Shen, S Li, X Zhao, J Zou - IEEE Transactions on Information …, 2022 - ieeexplore.ieee.org
With the wide use of smartphones, more private data are collected and saved in the smartphones. This raises higher requirements for secure and effective user authentication …
A Mahfouz, A Hamdy, MA Eldin… - Pervasive and Mobile …, 2024 - Elsevier
Several behavioral biometric authentication frameworks have been proposed to authenticate smartphone users based on the analysis of sensors and services. These …
Mobile devices and technologies have become increasingly popular, offering comparable storage and computational capabilities to desktop computers allowing users to store and …
To protect smartphones from unauthorized access, the user has the option to activate authentication mechanisms: PIN, Password, or Pattern. Unfortunately, these mechanisms …
Pervasive in nature and extensively used for a wide range of features, smartphone provides functionality such as social networking, online shopping, mobile gaming, private/group …
Y Yang, B Guo, Z Wang, M Li, Z Yu, X Zhou - Ad Hoc Networks, 2019 - Elsevier
With the emergence of smartphones as an essential part of our daily lives, continuous authentication becomes an urgent need which could efficiently protect user security and …
Y Wang, X Zhang, H Hu - Information, 2023 - mdpi.com
Recent developments in the mobile and intelligence industry have led to an explosion in the use of multiple smart devices such as smartphones, tablets, smart bracelets, etc. To achieve …
Z Shen, S Li, X Zhao, J Zou - IEEE Transactions on Knowledge …, 2023 - ieeexplore.ieee.org
Continuous authentication, which provides identity verification using behavioral biometrics in an implicit and transparent manner, has shown potentials for protecting privacy. As the …
Behavioral biometric-based continuous user authentication is promising for securing mobile phones while complementing traditional security mechanisms. However, the existing state of …