Challenges and opportunities of biometric user authentication in the age of iot: A survey

CW Lien, S Vhaduri - ACM Computing Surveys, 2023 - dl.acm.org
While the Internet of Things (IoT) devices, such as smartwatches, provide a range of services
from managing financial transactions to monitoring smart homes, these devices often lead to …

A review of biometric technology along with trends and prospects

JA Unar, WC Seng, A Abbasi - Pattern recognition, 2014 - Elsevier
Identity management through biometrics offer potential advantages over knowledge and
possession based methods. A wide variety of biometric modalities have been tested so far …

HMOG: New behavioral biometric features for continuous authentication of smartphone users

Z Sitová, J Šeděnka, Q Yang, G Peng… - IEEE Transactions …, 2015 - ieeexplore.ieee.org
We introduce hand movement, orientation, and grasp (HMOG), a set of behavioral features
to continuously authenticate smartphone users. HMOG features unobtrusively capture subtle …

Rendered insecure: GPU side channel attacks are practical

H Naghibijouybari, A Neupane, Z Qian… - Proceedings of the …, 2018 - dl.acm.org
Graphics Processing Units (GPUs) are commonly integrated with computing devices to
enhance the performance and capabilities of graphical workloads. In addition, they are …

[BOG][B] Introduction to biometrics

A Jain, R Bolle, S Pankanti - 1996 - Springer
Biometrics deals with identification of individuals based on their biological or behavioral
characteristics. Biometrics has lately been receiving attention in popular media, it is widely …

[PDF][PDF] Biometric authentication and identification using keystroke dynamics: A survey

SP Banerjee, DL Woodard - Journal of Pattern recognition research, 2012 - Citeseer
Dependence on computers to store and process sensitive information has made it
necessary to secure them from intruders. A behavioral biometric such as keystroke dynamics …

Biometrics: a tool for information security

AK Jain, A Ross, S Pankanti - IEEE transactions on information …, 2006 - ieeexplore.ieee.org
Establishing identity is becoming critical in our vastly interconnected society. Questions such
as" Is she really who she claims to be?,"" Is this person authorized to use this facility?," or" Is …

A survey of keystroke dynamics biometrics

PS Teh, ABJ Teoh, S Yue - The Scientific World Journal, 2013 - Wiley Online Library
Research on keystroke dynamics biometrics has been increasing, especially in the last
decade. The main motivation behind this effort is due to the fact that keystroke dynamics …

[HTML][HTML] Keystroke dynamics as a biometric for authentication

F Monrose, AD Rubin - Future Generation computer systems, 2000 - Elsevier
More than ever before the Internet is changing computing as we know it. Global access to
information and resources is becoming an integral part of nearly every aspect of our lives …

Methods, systems, and media for detecting covert malware

BM Bowen, PV Prabhu, VP Kemerlis… - US Patent …, 2013 - Google Patents
Methods, systems, and media for detecting covert malware are provided. In accordance with
some embodiments, a method for detecting covert malware in a computing environ ment is …