Continuous user authentication on mobile devices: Recent progress and remaining challenges

VM Patel, R Chellappa, D Chandra… - IEEE Signal …, 2016 - ieeexplore.ieee.org
Recent developments in sensing and communication technologies have led to an explosion
in the use of mobile devices such as smart phones and tablets. With the increase in the use …

Privacy-preserving continuous authentication using behavioral biometrics

AF Baig, S Eskeland, B Yang - International Journal of Information …, 2023 - Springer
Continuous authentication modalities collect and utilize users' sensitive data to authenticate
them continuously. Such data contain information about user activities, behaviors, and other …

Secure outsourced biometric authentication with performance evaluation on smartphones

J Šeděnka, S Govindarajan, P Gasti… - IEEE Transactions on …, 2014 - ieeexplore.ieee.org
We design privacy-preserving protocols for scaled Manhattan and scaled Euclidean
verifiers, secure against malicious clients and honest-but-curious server. We then augment …

Mobile device application, bluetooth, and wi-fi usage data as behavioral biometric traits

TJ Neal, DL Woodard… - 2015 IEEE 7th International …, 2015 - ieeexplore.ieee.org
Patterns in the use of mobile devices have the potential to be used as a behavioral biometric
for identification of the device user. We explore the distinctiveness and permanence of …

Evaluation of user authentication methods in the gadget-free world

K Halunen, J Häikiö, V Vallivaara - Pervasive and Mobile Computing, 2017 - Elsevier
In an ideal gadget-free environment the user is interacting with the environment and the
services through only “natural” means. This imposes restrictions on many aspects of the …

Novel and Efficient Privacy-Preserving Continuous Authentication

AF Baig, S Eskeland, B Yang - Cryptography, 2024 - mdpi.com
Continuous authentication enhances security by re-verifying a user's validity during the
active session. It utilizes data about users' behavioral actions and contextual information to …

A lightweight privacy-aware continuous authentication protocol-paca

A Acar, S Ali, K Karabina, C Kaygusuz, H Aksu… - ACM Transactions on …, 2021 - dl.acm.org
As many vulnerabilities of one-time authentication systems have already been uncovered,
there is a growing need and trend to adopt continuous authentication systems. Biometrics …

Reconciling user privacy and implicit authentication for mobile devices

SF Shahandashti, R Safavi-Naini, NA Safa - Computers & Security, 2015 - Elsevier
In an implicit authentication system, a user profile is used as an additional factor to
strengthen the authentication of mobile users. The profile consists of features that are …

Privacy considerations for risk-based authentication systems

S Wiefling, J Tolsdorf, LL Iacono - 2021 IEEE European …, 2021 - ieeexplore.ieee.org
Risk-based authentication (RBA) extends authentication mechanisms to make them more
robust against account takeover attacks, such as those using stolen passwords. RBA is …

Flexible and robust privacy-preserving implicit authentication

J Domingo-Ferrer, Q Wu, A Blanco-Justicia - ICT Systems Security and …, 2015 - Springer
Implicit authentication consists of a server authenticating a user based on the user's usage
profile, instead of/in addition to relying on something the user explicitly knows (passwords …