Continuous user authentication on mobile devices: Recent progress and remaining challenges
Recent developments in sensing and communication technologies have led to an explosion
in the use of mobile devices such as smart phones and tablets. With the increase in the use …
in the use of mobile devices such as smart phones and tablets. With the increase in the use …
Evaluating user perception of multi-factor authentication: A systematic review
Is FIDO2 the kingslayer of user authentication? A comparative usability study of FIDO2 passwordless authentication
The newest contender for succeeding passwords as the incumbent web authentication
scheme is the FIDO2 standard. Jointly developed and backed by the FIDO Alliance and the …
scheme is the FIDO2 standard. Jointly developed and backed by the FIDO Alliance and the …
" Privacy is not for me, it's for those rich women": Performative Privacy Practices on Mobile Phones by Women in South Asia
Women in South Asian own fewer personal devices like laptops and phones than women
elsewhere in the world. Further, cultural expectations dictate that they should share mobile …
elsewhere in the world. Further, cultural expectations dictate that they should share mobile …
Active authentication on mobile devices via stylometry, application usage, web browsing, and GPS location
Active authentication is the problem of continuously verifying the identity of a person based
on behavioral aspects of their interaction with a computing device. In this paper, we collect …
on behavioral aspects of their interaction with a computing device. In this paper, we collect …
Users' expectations about and use of smartphone privacy and security settings
With the growing smartphone penetration rate, smartphone settings remain one of the main
models for information privacy and security controls. Yet, their usability is largely …
models for information privacy and security controls. Yet, their usability is largely …
Cracking android pattern lock in five attempts
Pattern lock is widely used as a mechanism for authentication and authorization on Android
devices. In this paper, we demonstrate a novel video-based attack to reconstruct Android …
devices. In this paper, we demonstrate a novel video-based attack to reconstruct Android …