Surveying the development of biometric user authentication on mobile phones

W Meng, DS Wong, S Furnell… - … Surveys & Tutorials, 2014 - ieeexplore.ieee.org
Designing reliable user authentication on mobile phones is becoming an increasingly
important task to protect users' private information and data. Since biometric approaches can …

A broad review on non-intrusive active user authentication in biometrics

PA Thomas, K Preetha Mathew - Journal of Ambient Intelligence and …, 2023 - Springer
Authentication is the process of kee** the user's personal information as confidential in
digital applications. Moreover, the user authentication process in the digital platform is …

Smart user authentication through actuation of daily activities leveraging WiFi-enabled IoT

C Shi, J Liu, H Liu, Y Chen - Proceedings of the 18th ACM international …, 2017 - dl.acm.org
User authentication is a critical process in both corporate and home environments due to the
ever-growing security and privacy concerns. With the advancement of smart cities and home …

Touchalytics: On the applicability of touchscreen input as a behavioral biometric for continuous authentication

M Frank, R Biedert, E Ma, I Martinovic… - IEEE transactions on …, 2012 - ieeexplore.ieee.org
We investigate whether a classifier can continuously authenticate users based on the way
they interact with the touchscreen of a smart phone. We propose a set of 30 behavioral touch …

You are how you touch: User verification on smartphones via tap** behaviors

N Zheng, K Bai, H Huang… - 2014 IEEE 22nd …, 2014 - ieeexplore.ieee.org
Smartphone users have their own unique behavioral patterns when tap** on the touch
screens. These personal patterns are reflected on the different rhythm, strength, and angle …

Cybersecurity for digital manufacturing

D Wu, A Ren, W Zhang, F Fan, P Liu, X Fu… - Journal of manufacturing …, 2018 - Elsevier
Digital manufacturing aims to create highly customizable products with higher quality and
lower costs by integrating Industrial Internet of Things, big data analytics, cloud computing …

[PDF][PDF] Unobservable re-authentication for smartphones.

L Li, X Zhao, G Xue - NDSS, 2013 - Citeseer
The widespread usage of smartphones gives rise to new security and privacy concerns.
Smartphones are becoming a personal entrance to networks, and may store private …

A study on continuous authentication using a combination of keystroke and mouse biometrics

S Mondal, P Bours - Neurocomputing, 2017 - Elsevier
In this paper we focus on a context independent continuous authentication system that
reacts on every separate action performed by a user. We contribute with a robust dynamic …

User identification and authentication using multi-modal behavioral biometrics

KO Bailey, JS Okolica, GL Peterson - Computers & Security, 2014 - Elsevier
Biometric computer authentication has an advantage over password and access card
authentication in that it is based on something you are, which is not easily copied or stolen …

User authentication through mouse dynamics

C Shen, Z Cai, X Guan, Y Du… - IEEE Transactions on …, 2012 - ieeexplore.ieee.org
Behavior-based user authentication with pointing devices, such as mice or touchpads, has
been gaining attention. As an emerging behavioral biometric, mouse dynamics aims to …