The computer for the 21st century
Human-computer interaction
Security Engineering: A Guide to Building Dependable Distributed Systems
Security Engineering: A Guide to Building Dependable Distributed Systems
Keystroke analysis of free text
ACM Transactions on Information and System Security (TISSEC)
Access Control Systems: Security, Identity Management and Trust Models
Access Control Systems: Security, Identity Management and Trust Models
Mimicry Attack on Strategy-Based Behavioral Biometric
ITNG '08 Proceedings of the Fifth International Conference on Information Technology: New Generations
Identity theft, computers and behavioral biometrics
ISI'09 Proceedings of the 2009 IEEE international conference on Intelligence and security informatics
Behavioral Biometrics For Human Identification: Intelligent Applications
Behavioral Biometrics For Human Identification: Intelligent Applications
Unobtrusive User-Authentication on Mobile Phones Using Biometric Gait Recognition
IIH-MSP '10 Proceedings of the 2010 Sixth International Conference on Intelligent Information Hiding and Multimedia Signal Processing
Identity Management: Concepts, Technologies, and Systems
Identity Management: Concepts, Technologies, and Systems
Single sign-on and key establishment for ubiquitous smart environments
ICCSA'06 Proceedings of the 2006 international conference on Computational Science and Its Applications - Volume Part IV
OTM'06 Proceedings of the 2006 international conference on On the Move to Meaningful Internet Systems: AWeSOMe, CAMS, COMINF, IS, KSinBIT, MIOS-CIAO, MONET - Volume Part II
An introduction to biometric recognition
IEEE Transactions on Circuits and Systems for Video Technology
IJCB '11 Proceedings of the 2011 International Joint Conference on Biometrics
Hi-index | 0.00 |
Driven by the rapid development of ubiquitous and pervasive computing, personalized services and applications are deployed to support our lives. Accordingly, the number of interfaces and devices (smartphone, tablet computer, etc.) provided to access and consume these services is growing continuously. To simplify the complexity of managing many accounts with different credentials, Single Sign-On (SSO) solutions have been introduced. However, a single password for many accounts represents a single-point-of-failure. Furthermore, once initiated SSO session is a high potential risk when the working station is left unlocked and unattended. In this paper, we present a conception of a Persistent Single Sign-On (PSSO) for ubiquitous home environments by involving the capabilities of Behavioral Biometrics to check the identity of the user continuously in an unobtrusive manner.