Dynamic identity verification via keystroke characteristics
International Journal of Man-Machine Studies
Authentication via keystroke dynamics
Proceedings of the 4th ACM conference on Computer and communications security
Person Identification Using Multiple Cues
IEEE Transactions on Pattern Analysis and Machine Intelligence
Gait-Based Recognition of Humans Using Continuous HMMs
FGR '02 Proceedings of the Fifth IEEE International Conference on Automatic Face and Gesture Recognition
Secure verification of location claims
WiSe '03 Proceedings of the 2nd ACM workshop on Wireless security
Discovering personally meaningful places: An interactive clustering approach
ACM Transactions on Information Systems (TOIS)
Cognitive security for personal devices
Proceedings of the 1st ACM workshop on Workshop on AISec
CloudAV: N-version antivirus in the network cloud
SS'08 Proceedings of the 17th conference on Security symposium
Towards movement-aware access control
SPRINGL '08 Proceedings of the SIGSPATIAL ACM GIS 2008 International Workshop on Security and Privacy in GIS and LBS
Server-side detection of malware infection
NSPW '09 Proceedings of the 2009 workshop on New security paradigms workshop
Combining biometric evidence for person authentication
ASB'03 Proceedings of the 1st international conference on Advanced Studies in Biometrics
Towards security policy decisions based on context profiling
Proceedings of the 3rd ACM workshop on Artificial intelligence and security
Authentication in the clouds: a framework and its application to mobile users
Proceedings of the 2010 ACM workshop on Cloud computing security workshop
A field study of user behavior and perceptions in smartcard authentication
INTERACT'11 Proceedings of the 13th IFIP TC 13 international conference on Human-computer interaction - Volume Part IV
Proceedings of the 2011 workshop on New security paradigms workshop
Touch me once and i know it's you!: implicit authentication based on touch screen patterns
Proceedings of the SIGCHI Conference on Human Factors in Computing Systems
Abusing notification services on smartphones for phishing and spamming
WOOT'12 Proceedings of the 6th USENIX conference on Offensive Technologies
Short paper: smartphones: not smart enough?
Proceedings of the second ACM workshop on Security and privacy in smartphones and mobile devices
PassChords: secure multi-touch authentication for blind people
Proceedings of the 14th international ACM SIGACCESS conference on Computers and accessibility
WYSWYE: shoulder surfing defense for recognition based graphical passwords
Proceedings of the 24th Australian Computer-Human Interaction Conference
Biometric authentication on a mobile device: a study of user effort, error and task disruption
Proceedings of the 28th Annual Computer Security Applications Conference
Back-of-device authentication on smartphones
Proceedings of the SIGCHI Conference on Human Factors in Computing Systems
A tap and gesture hybrid method for authenticating smartphone users
Proceedings of the 15th international conference on Human-computer interaction with mobile devices and services
CASA: context-aware scalable authentication
Proceedings of the Ninth Symposium on Usable Privacy and Security
Passwords and interfaces: towards creating stronger passwords by using mobile phone handsets
Proceedings of the Third ACM workshop on Security and privacy in smartphones & mobile devices
TIPS: context-aware implicit user identification using touch screen in uncontrolled environments
Proceedings of the 15th Workshop on Mobile Computing Systems and Applications
Security and privacy for augmented reality systems
Communications of the ACM
Hi-index | 0.02 |
We introduce the notion of implicit authentication - the ability to authenticate mobile users based on actions they would carry out anyway. We develop a model for how to perform implicit authentication, and describe experiments aimed at assessing the benefits of our techniques. Our preliminary findings support that this is a meaningful approach, whether used to increase usability or increase security.