Surveying the development of biometric user authentication on mobile phones

W Meng, DS Wong, S Furnell… - … Surveys & Tutorials, 2014 - ieeexplore.ieee.org
Designing reliable user authentication on mobile phones is becoming an increasingly
important task to protect users' private information and data. Since biometric approaches can …

[HTML][HTML] A review of AI cloud and edge sensors, methods, and applications for the recognition of emotional, affective and physiological states

A Kaklauskas, A Abraham, I Ubarte, R Kliukas… - Sensors, 2022 - mdpi.com
Affective, emotional, and physiological states (AFFECT) detection and recognition by
capturing human signals is a fast-growing area, which has been applied across numerous …

Is FIDO2 the kingslayer of user authentication? A comparative usability study of FIDO2 passwordless authentication

SG Lyastani, M Schilling, M Neumayr… - … IEEE Symposium on …, 2020 - ieeexplore.ieee.org
The newest contender for succeeding passwords as the incumbent web authentication
scheme is the FIDO2 standard. Jointly developed and backed by the FIDO Alliance and the …

System and method for biometric protocol standards

JR Callahan, A Othman - US Patent 11,329,980, 2022 - Google Patents
Secure communications are provided between a user com puting device and a server
computing device. An enrollment request is received from a user computing device that is …

Firme: Face and iris recognition for mobile engagement

M De Marsico, C Galdi, M Nappi, D Riccio - Image and Vision Computing, 2014 - Elsevier
Mobile devices, namely phones and tablets, have long gone “smart”. Their growing use is
both a cause and an effect of their technological advancement. Among the others, their …

Consumer-facing technology fraud: Economics, attack methods and potential solutions

MA Ali, MA Azad, MP Centeno, F Hao… - Future Generation …, 2019 - Elsevier
The emerging use of modern technologies has not only benefited society but also attracted
fraudsters and criminals to misuse the technology for financial benefits. Fraud over the …

A tale of two studies: The best and worst of yubikey usability

J Reynolds, T Smith, K Reese… - … IEEE Symposium on …, 2018 - ieeexplore.ieee.org
Two-factor authentication (2FA) significantly improves the security of password-based
authentication. Recently, there has been increased interest in Universal 2nd Factor (U2F) …

Biometric authentication on iphone and android: Usability, perceptions, and influences on adoption

R Bhagavatula, B Ur, K Iacovino, SM Kywe, LF Cranor… - 2015 - ink.library.smu.edu.sg
While biometrics have long been promoted as the future of authentication, the recent
introduction of Android face unlock and iPhone fingerprint unlock are among the first large …

Hold and sign: A novel behavioral biometrics for smartphone user authentication

A Buriro, B Crispo, F Delfrari… - 2016 IEEE security and …, 2016 - ieeexplore.ieee.org
The search for new authentication methods to replace passwords for modern mobile devices
such as smartphones and tablets has attracted a substantial amount of research in recent …

" It's Stored, Hopefully, on an Encrypted Server'': Mitigating Users' Misconceptions About {FIDO2} Biometric {WebAuthn}

L Lassak, A Hildebrandt, M Golla, B Ur - 30th USENIX Security …, 2021 - usenix.org
While prior attempts at passwordless authentication on the web have required specialized
hardware, FIDO2's WebAuthn protocol lets users sign into websites with their smartphone …