Continuous user authentication on mobile devices: Recent progress and remaining challenges

VM Patel, R Chellappa, D Chandra… - IEEE Signal …, 2016 - ieeexplore.ieee.org
Recent developments in sensing and communication technologies have led to an explosion
in the use of mobile devices such as smart phones and tablets. With the increase in the use …

A survey of keystroke dynamics biometrics

PS Teh, ABJ Teoh, S Yue - The Scientific World Journal, 2013 - Wiley Online Library
Research on keystroke dynamics biometrics has been increasing, especially in the last
decade. The main motivation behind this effort is due to the fact that keystroke dynamics …

HMOG: New behavioral biometric features for continuous authentication of smartphone users

Z Sitová, J Šeděnka, Q Yang, G Peng… - IEEE Transactions …, 2015 - ieeexplore.ieee.org
We introduce hand movement, orientation, and grasp (HMOG), a set of behavioral features
to continuously authenticate smartphone users. HMOG features unobtrusively capture subtle …

Touchalytics: On the applicability of touchscreen input as a behavioral biometric for continuous authentication

M Frank, R Biedert, E Ma, I Martinovic… - IEEE transactions on …, 2012 - ieeexplore.ieee.org
We investigate whether a classifier can continuously authenticate users based on the way
they interact with the touchscreen of a smart phone. We propose a set of 30 behavioral touch …

Sensor-based continuous authentication of smartphones' users using behavioral biometrics: A contemporary survey

M Abuhamad, A Abusnaina, DH Nyang… - IEEE Internet of …, 2020 - ieeexplore.ieee.org
Mobile devices and technologies have become increasingly popular, offering comparable
storage and computational capabilities to desktop computers allowing users to store and …

Surveying the development of biometric user authentication on mobile phones

W Meng, DS Wong, S Furnell… - … Surveys & Tutorials, 2014 - ieeexplore.ieee.org
Designing reliable user authentication on mobile phones is becoming an increasingly
important task to protect users' private information and data. Since biometric approaches can …

Authentication in mobile cloud computing: A survey

M Alizadeh, S Abolfazli, M Zamani, S Baharun… - Journal of Network and …, 2016 - Elsevier
Mobile cloud computing (MCC) is the state-of-the-art mobile distributed computing model
that incorporates multitude of heterogeneous cloud-based resources to augment …

Power to the people? The evolving recognition of human aspects of security

S Furnell, N Clarke - computers & security, 2012 - Elsevier
It is perhaps unsurprising to find much of the focus in IT and computer security being drawn
towards the technical aspects of the discipline. However, it is increasingly recognised that …

Multiple authentication mechanisms for accessing service center supporting a variety of products

KD Tuchman, BA Sharpe, HD Truong - US Patent 8,572,707, 2013 - Google Patents
BACKGROUND Prior to the advent and prolific use of distributed network environments such
as the Internet, customer service sessions typically occurred over a teleconference between …

On the need for different security methods on mobile phones

N Ben-Asher, N Kirschnick, H Sieger, J Meyer… - Proceedings of the 13th …, 2011 - dl.acm.org
Mobile phones are rapidly becoming small-size general purpose computers, so-called
smartphones. However, applications and data stored on mobile phones are less protected …