Multi-factor authentication: A survey

A Ometov, S Bezzateev, N Mäkitalo, S Andreev… - Cryptography, 2018 - mdpi.com
Today, digitalization decisively penetrates all the sides of the modern society. One of the key
enablers to maintain this process secure is authentication. It covers many different areas of a …

Continuous user authentication on mobile devices: Recent progress and remaining challenges

VM Patel, R Chellappa, D Chandra… - IEEE Signal …, 2016 - ieeexplore.ieee.org
Recent developments in sensing and communication technologies have led to an explosion
in the use of mobile devices such as smart phones and tablets. With the increase in the use …

A multi-biometric system for continuous student authentication in e-learning platforms

G Fenu, M Marras, L Boratto - Pattern Recognition Letters, 2018 - Elsevier
In recent years, online courses have emerged as a new way to educate students in distance
learning settings. However, as the demand increases, educational institutions are facing the …

[HTML][HTML] Real-world smartphone-based gait recognition

H Alobaidi, N Clarke, F Li, A Alruban - Computers & Security, 2022 - Elsevier
As the smartphone and the services it provides are becoming targets of cybercrime, it is
critical to secure smartphones. However, it is important security controls are designed to …

Active authentication for mobile devices utilising behaviour profiling

F Li, N Clarke, M Papadaki, P Dowland - International journal of …, 2014 - Springer
With nearly 6 billion subscribers around the world, mobile devices have become an
indispensable component in modern society. The majority of these devices rely upon …

Users' privacy attitudes towards the use of behavioral biometrics continuous authentication (BBCA) technologies: A protection motivation theory approach

A Skalkos, I Stylios, M Karyda, S Kokolakis - Journal of Cybersecurity and …, 2021 - mdpi.com
Smartphone user authentication based on passwords, PINs, and touch patterns raises
several security concerns. Behavioral Biometrics Continuous Authentication (BBCA) …

Multi-modal behavioural biometric authentication for mobile devices

H Saevanee, NL Clarke, SM Furnell - … and Privacy Research: 27th IFIP TC …, 2012 - Springer
The potential advantages of behavioural biometrics are that they can be utilised in a
transparent (non-intrusive) and continuous authentication system. However, individual …

Machine learning (in) security: A stream of problems

F Ceschin, M Botacin, A Bifet, B Pfahringer… - … Threats: Research and …, 2024 - dl.acm.org
Machine Learning (ML) has been widely applied to cybersecurity and is considered state-of-
the-art for solving many of the open issues in that field. However, it is very difficult to evaluate …

Continuous and transparent multimodal authentication: reviewing the state of the art

A Al Abdulwahid, N Clarke, I Stengel, S Furnell… - Cluster …, 2016 - Springer
Individuals, businesses and governments undertake an ever-growing range of activities
online and via various Internet-enabled digital devices. Unfortunately, these activities …

Efficient and low latency detection of intruders in mobile active authentication

P Perera, VM Patel - IEEE Transactions on Information …, 2017 - ieeexplore.ieee.org
Active authentication (AA) refers to the problem of continuously verifying the identity of a
mobile device user for the purpose of securing the device. We address the problem of …