You are how you touch: User verification on smartphones via tap** behaviors

N Zheng, K Bai, H Huang… - 2014 IEEE 22nd …, 2014 - ieeexplore.ieee.org
Smartphone users have their own unique behavioral patterns when tap** on the touch
screens. These personal patterns are reflected on the different rhythm, strength, and angle …

Exploring touch-screen biometrics for user identification on smart phones

J Angulo, E Wästlund - Privacy and Identity Management for Life: 7th IFIP …, 2012 - Springer
The use of mobile smart devices for storing sensitive information and accessing online
services is increasing. At the same time, methods for authenticating users into their devices …

Relationship Based Trust Verification Schema

ME Davis, MG Dyor, DA Gerrity, X Huang… - US Patent App. 13 …, 2013 - Google Patents
(57) ABSTRACT A computationally-implemented method, in accordance with certain
example embodiments, may include, but is not limited to: receiving at a computer device one …

[PDF][PDF] Biometric authentication methods on smartphones: A survey.

R Spolaor, QQ Li, M Monaro, M Conti… - PsychNology …, 2016 - drive.google.com
Nowadays, users are starting to develop a symbiotic bound with their smartphones. Users
continuously carry these devices and use them for daily communication activities and social …

Implementing multiple biometric features for a recall-based graphical keystroke dynamics authentication system on a smart phone

CL Liu, CJ Tsai, TY Chang, WJ Tsai… - Journal of Network and …, 2015 - Elsevier
Abstract Keystroke Dynamics-based Authentication (KDA) is a type of behavioral biometric
method. It verifies user identity via the keystroke features gathered from the keystroke events …

Biometric authentication & identification through behavioral biometrics: A survey

G Pahuja, TN Nagabhushan - 2015 International Conference …, 2015 - ieeexplore.ieee.org
Computer Security is an important issue now a days because these are used everywhere to
store and process the sensitive information. Millions of transactions occur through internet …

[PDF][PDF] Keystroke dynamic authentication in mobile cloud computing

M Babaeizadeh, M Bakhtiari, MA Maarof - 2014 - eprints.utm.my
Contemporary mobile sets are not used just for making calls and sending messages. They
are increasingly being used in Mobile Cloud Computing (MCC) to store sensitive and critical …

User behaviour-based mobile authentication system

ABA Ali, V Ponnusamy, A Sangodiah - Advances in Computer …, 2019 - Springer
Android is one of the most popular operating systems being used in smartphones and is
facing security issues. Many authentication techniques are being used, and most of them are …

An introduction to biometric authentication systems

T Das, A Harshey, V Mishra, A Srivastava - Textbook of forensic science, 2023 - Springer
The science of biometric exponentially evolved since its inception. From human
identification to attendance verification in organizations, biometrics have expanded a very …

[PDF][PDF] Implicit authentication on mobile devices

T Stockinger - Ubiquitous Computing, 2011 - Citeseer
One major disadvantage of mobile devices is their liability to theft. Since people make more
intense use of their smart phones to browse the web and store potentially sensitive data, it is …