Securing Fingerprint Template: Fuzzy Vault with Helper Data
CVPRW '06 Proceedings of the 2006 Conference on Computer Vision and Pattern Recognition Workshop
Authenticating mobile phone users using keystroke analysis
International Journal of Information Security
Implicit authentication through learning user behavior
ISC'10 Proceedings of the 13th international conference on Information security
Exploring implicit memory for painless password recovery
Proceedings of the SIGCHI Conference on Human Factors in Computing Systems
Keystroke dynamics authentication for mobile phones
Proceedings of the 2011 ACM Symposium on Applied Computing
SenGuard: Passive user identification on smartphones using multiple sensors
WIMOB '11 Proceedings of the 2011 IEEE 7th International Conference on Wireless and Mobile Computing, Networking and Communications
AVBPA'05 Proceedings of the 5th international conference on Audio- and Video-Based Biometric Person Authentication
Touch me once and i know it's you!: implicit authentication based on touch screen patterns
Proceedings of the SIGCHI Conference on Human Factors in Computing Systems
Tapprints: your finger taps have fingerprints
Proceedings of the 10th international conference on Mobile systems, applications, and services
Hi-index | 0.00 |
AbstractWhile enriching the user experiences, the developmentof mobile devices and applications introduces new securityand privacy vulnerabilities for the remote services accessed bymobile device users. A trusted and usable authentication architecturefor mobile devices is thus in high demand. In this paper,we leverage a unified structure, consisting of transparent TFTbasedfingerprint sensors, touchscreen, and display, to propose anovel identity management mechanism that authenticates usersof touch based mobile devices for accessing the local devicesand remote services. Our solution differs from the previous onetimeand enforced authentication approaches through two novelfeatures: (i) user transparent authentication process, requiringneither password nor extra login steps and (ii) continuousidentity management based on fingerprint biometric, where eachuser-to-device touch interaction is used toward authentication.Moreover, we introduce two different security scenarios, one forlocal identity management, and the second extended solution forremote identity management. Finally we employ TRUST (TrustReinforcement based on Unified Structural Touch-display) tosolve the identity challenge in cyber space.