Continuous user authentication on mobile devices: Recent progress and remaining challenges
Recent developments in sensing and communication technologies have led to an explosion
in the use of mobile devices such as smart phones and tablets. With the increase in the use …
in the use of mobile devices such as smart phones and tablets. With the increase in the use …
Privacy-preserving continuous authentication using behavioral biometrics
Continuous authentication modalities collect and utilize users' sensitive data to authenticate
them continuously. Such data contain information about user activities, behaviors, and other …
them continuously. Such data contain information about user activities, behaviors, and other …
Secure outsourced biometric authentication with performance evaluation on smartphones
We design privacy-preserving protocols for scaled Manhattan and scaled Euclidean
verifiers, secure against malicious clients and honest-but-curious server. We then augment …
verifiers, secure against malicious clients and honest-but-curious server. We then augment …
Mobile device application, bluetooth, and wi-fi usage data as behavioral biometric traits
TJ Neal, DL Woodard… - 2015 IEEE 7th International …, 2015 - ieeexplore.ieee.org
Patterns in the use of mobile devices have the potential to be used as a behavioral biometric
for identification of the device user. We explore the distinctiveness and permanence of …
for identification of the device user. We explore the distinctiveness and permanence of …
Evaluation of user authentication methods in the gadget-free world
In an ideal gadget-free environment the user is interacting with the environment and the
services through only “natural” means. This imposes restrictions on many aspects of the …
services through only “natural” means. This imposes restrictions on many aspects of the …
Novel and Efficient Privacy-Preserving Continuous Authentication
Continuous authentication enhances security by re-verifying a user's validity during the
active session. It utilizes data about users' behavioral actions and contextual information to …
active session. It utilizes data about users' behavioral actions and contextual information to …
A lightweight privacy-aware continuous authentication protocol-paca
As many vulnerabilities of one-time authentication systems have already been uncovered,
there is a growing need and trend to adopt continuous authentication systems. Biometrics …
there is a growing need and trend to adopt continuous authentication systems. Biometrics …
Reconciling user privacy and implicit authentication for mobile devices
In an implicit authentication system, a user profile is used as an additional factor to
strengthen the authentication of mobile users. The profile consists of features that are …
strengthen the authentication of mobile users. The profile consists of features that are …
Privacy considerations for risk-based authentication systems
Risk-based authentication (RBA) extends authentication mechanisms to make them more
robust against account takeover attacks, such as those using stolen passwords. RBA is …
robust against account takeover attacks, such as those using stolen passwords. RBA is …
Flexible and robust privacy-preserving implicit authentication
Implicit authentication consists of a server authenticating a user based on the user's usage
profile, instead of/in addition to relying on something the user explicitly knows (passwords …
profile, instead of/in addition to relying on something the user explicitly knows (passwords …