Dynamic identity verification via keystroke characteristics
International Journal of Man-Machine Studies
Authentication via keystroke dynamics
Proceedings of the 4th ACM conference on Computer and communications security
Person Identification Using Multiple Cues
IEEE Transactions on Pattern Analysis and Machine Intelligence
Gait-Based Recognition of Humans Using Continuous HMMs
FGR '02 Proceedings of the Fifth IEEE International Conference on Automatic Face and Gesture Recognition
Secure verification of location claims
WiSe '03 Proceedings of the 2nd ACM workshop on Wireless security
Cognitive security for personal devices
Proceedings of the 1st ACM workshop on Workshop on AISec
Towards movement-aware access control
SPRINGL '08 Proceedings of the SIGSPATIAL ACM GIS 2008 International Workshop on Security and Privacy in GIS and LBS
Inferring Identity Using Accelerometers in Television Remote Controls
Pervasive '09 Proceedings of the 7th International Conference on Pervasive Computing
Server-side detection of malware infection
NSPW '09 Proceedings of the 2009 workshop on New security paradigms workshop
Differential privacy: a survey of results
TAMC'08 Proceedings of the 5th international conference on Theory and applications of models of computation
Proceedings of the 8th international conference on Mobile systems, applications, and services
Combining biometric evidence for person authentication
ASB'03 Proceedings of the 1st international conference on Advanced Studies in Biometrics
Authentication in the clouds: a framework and its application to mobile users
Proceedings of the 2010 ACM workshop on Cloud computing security workshop
Pervasive'11 Proceedings of the 9th international conference on Pervasive computing
Touch me once and i know it's you!: implicit authentication based on touch screen patterns
Proceedings of the SIGCHI Conference on Human Factors in Computing Systems
Progressive authentication: deciding when to authenticate on mobile phones
Security'12 Proceedings of the 21st USENIX conference on Security symposium
Towards macroscopic human behavior based authentication for mobile transactions
Proceedings of the 2012 ACM Conference on Ubiquitous Computing
Continuous Remote Mobile Identity Management Using Biometric Integrated Touch-Display
MICROW '12 Proceedings of the 2012 45th Annual IEEE/ACM International Symposium on Microarchitecture Workshops
Know your enemy: the risk of unauthorized access in smartphones by insiders
Proceedings of the 15th international conference on Human-computer interaction with mobile devices and services
Explicit authentication response considered harmful
Proceedings of the 2013 workshop on New security paradigms workshop
Towards application-centric implicit authentication on smartphones
Proceedings of the 15th Workshop on Mobile Computing Systems and Applications
Hi-index | 0.00 |
Users are increasingly dependent on mobile devices. However, current authentication methods like password entry are significantly more frustrating and difficult to perform on these devices, leading users to create and reuse shorter passwords and pins, or no authentication at all. We present implicit authentication - authenticating users based on behavior patterns. We describe our model for performing implicit authentication and assess our techniques using more than two weeks of collected data from over 50 subjects.