A method for discovering components of human rituals from streams of sensor data
CIKM '10 Proceedings of the 19th ACM international conference on Information and knowledge management
Mining Sensor Streams for Discovering Human Activity Patterns over Time
ICDM '10 Proceedings of the 2010 IEEE International Conference on Data Mining
Implicit authentication through learning user behavior
ISC'10 Proceedings of the 13th international conference on Information security
Hi-index | 0.00 |
Integration of Near Field Communication (NFC) sensors into mobile devices has enabled their use for authentication. The ubiquitous nature of authentication using mobile devices comes though with increased security considerations. In addition to the risk of being stolen, mobile devices are increasingly susceptible to different types of software attacks. User-provided passwords such as Personal Identification Numbers (PINs) are often employed to ameliorate these limitations. The use of passwords though, has its own vulnerabilities that are mainly caused by the passwords' static nature and low entropy. To eliminate the security threats caused by untrusted devices and static passwords, we propose the development of new types of biometric authentication, based on macroscopic human behavior.