Authentication in mobile cloud computing: A survey

M Alizadeh, S Abolfazli, M Zamani, S Baharun… - Journal of Network and …, 2016 - Elsevier
Mobile cloud computing (MCC) is the state-of-the-art mobile distributed computing model
that incorporates multitude of heterogeneous cloud-based resources to augment …

A broad review on non-intrusive active user authentication in biometrics

PA Thomas, K Preetha Mathew - Journal of Ambient Intelligence and …, 2023 - Springer
Authentication is the process of kee** the user's personal information as confidential in
digital applications. Moreover, the user authentication process in the digital platform is …

Sensor-based continuous authentication of smartphones' users using behavioral biometrics: A contemporary survey

M Abuhamad, A Abusnaina, DH Nyang… - IEEE Internet of …, 2020 - ieeexplore.ieee.org
Mobile devices and technologies have become increasingly popular, offering comparable
storage and computational capabilities to desktop computers allowing users to store and …

Deep learning approaches for continuous authentication based on activity patterns using mobile sensing

S Mekruksavanich, A Jitpattanakul - Sensors, 2021 - mdpi.com
Smartphones as ubiquitous gadgets are rapidly becoming more intelligent and context-
aware as sensing, networking, and processing capabilities advance. These devices provide …

Behavioral biometrics & continuous user authentication on mobile devices: A survey

I Stylios, S Kokolakis, O Thanou, S Chatzis - Information Fusion, 2021 - Elsevier
This paper offers an up-to-date, comprehensive, extensive and targeted survey on
Behavioral Biometrics and Continuous Authentication technologies for mobile devices. Our …

Implicit authentication through learning user behavior

E Shi, Y Niu, M Jakobsson, R Chow - International conference on …, 2010 - Springer
Users are increasingly dependent on mobile devices. However, current authentication
methods like password entry are significantly more frustrating and difficult to perform on …

[PDF][PDF] Implicit authentication for mobile devices

M Jakobsson, E Shi, P Golle, R Chow - Proceedings of the 4th USENIX …, 2009 - usenix.org
We introduce the notion of implicit authentication–the ability to authenticate mobile users
based on actions they would carry out anyway. We develop a model for how to perform …

On the need for different security methods on mobile phones

N Ben-Asher, N Kirschnick, H Sieger, J Meyer… - Proceedings of the 13th …, 2011 - dl.acm.org
Mobile phones are rapidly becoming small-size general purpose computers, so-called
smartphones. However, applications and data stored on mobile phones are less protected …

A framework for continuous, transparent mobile device authentication

H Crawford, K Renaud, T Storer - Computers & Security, 2013 - Elsevier
We address two distinct problems with de facto mobile device authentication, as provided by
a password or sketch. Firstly, device activity is permitted on an all-or-nothing basis …

A secure anonymous authentication protocol for mobile services on elliptic curve cryptography

AG Reddy, AK Das, EJ Yoon, KY Yoo - IEEE access, 2016 - ieeexplore.ieee.org
Mobile user authentication is an essential topic to consider in the current communications
technology due to greater deployment of handheld devices and advanced technologies …