Evaluating the Efficacy of Implicit Authentication Under Realistic Operating Scenarios
暂无分享,去创建一个
[1] Christian Poellabauer,et al. Lessons learned from the netsense smartphone study , 2013, HotPlanet '13.
[2] Tao Feng,et al. Continuous mobile authentication using a novel Graphic Touch Gesture Feature , 2013, 2013 IEEE Sixth International Conference on Biometrics: Theory, Applications and Systems (BTAS).
[3] Steven Furnell,et al. Flexible and Transparent User Authentication for Mobile Devices , 2009, SEC.
[4] Florian Alt,et al. Evaluating the Influence of Targets and Hand Postures on Touch-based Behavioural Biometrics , 2016, CHI.
[5] Robert Biddle,et al. Graphical passwords: Learning from the first twelve years , 2012, CSUR.
[6] David A. Wagner,et al. Are You Ready to Lock? , 2014, CCS.
[7] Florian Alt,et al. Improving Accuracy, Applicability and Usability of Keystroke Biometrics on Mobile Touchscreen Devices , 2015, CHI.
[8] Jun Han,et al. ACCessory: password inference using accelerometers on smartphones , 2012, HotMobile '12.
[10] Sonia Chiasson,et al. Improving user authentication on mobile devices: a touchscreen graphical password , 2013, MobileHCI '13.
[11] J. B. Brooke,et al. SUS: A 'Quick and Dirty' Usability Scale , 1996 .
[12] Yongdae Kim,et al. Timing attacks on PIN input devices , 2010, CCS '10.
[13] Tao Feng,et al. TIPS: context-aware implicit user identification using touch screen in uncontrolled environments , 2014, HotMobile.
[14] Martin L. Griss,et al. Soft Authentication with Low-Cost Signatures , 2014, 2014 IEEE International Conference on Pervasive Computing and Communications (PerCom).
[15] Ivan Martinovic,et al. Preventing Lunchtime Attacks: Fighting Insider Threats With Eye Movement Biometrics , 2015, NDSS.
[16] Tao Feng,et al. Continuous Mobile Authentication Using Virtual Key Typing Biometrics , 2013, 2013 12th IEEE International Conference on Trust, Security and Privacy in Computing and Communications.
[17] Urs Hengartner,et al. Ask Me Again But Don't Annoy Me: Evaluating Re-authentication Strategies for Smartphones , 2016, SOUPS.
[18] Adam J. Aviv,et al. Smudge Attacks on Smartphone Touch Screens , 2010, WOOT.
[19] Peter E. Hart,et al. Nearest neighbor pattern classification , 1967, IEEE Trans. Inf. Theory.
[20] Urs Hengartner,et al. Privacy: Gone with the Typing! Identifying Web Users by Their Typing Patterns , 2011, 2011 IEEE Third Int'l Conference on Privacy, Security, Risk and Trust and 2011 IEEE Third Int'l Conference on Social Computing.
[21] Daniel P. Lopresti,et al. Forgery Quality and Its Implications for Behavioral Biometric Security , 2007, IEEE Transactions on Systems, Man, and Cybernetics, Part B (Cybernetics).
[22] Karen Renaud,et al. Understanding user perceptions of transparent authentication on a mobile device , 2014, Journal of Trust Management.
[23] Martin T. Hagan,et al. Neural network design , 1995 .
[24] Andreas P. Heiner,et al. A closer look at recognition-based graphical passwords on mobile devices , 2010, SOUPS.
[25] C. Spielberger. Manual for the State-Trait Anxiety Inventory (STAI) (Form Y , 1983 .
[26] Konstantin Beznosov,et al. Know your enemy: the risk of unauthorized access in smartphones by insiders , 2013, MobileHCI '13.
[27] Gordon Thomson. BYOD: enabling the chaos , 2012, Netw. Secur..
[28] Einar Snekkenes,et al. Spoof Attacks on Gait Authentication System , 2007, IEEE Transactions on Information Forensics and Security.
[29] Deron Liang,et al. A Novel Non-intrusive User Authentication Method Based on Touchscreen of Smartphones , 2013, 2013 International Symposium on Biometrics and Security Technologies.
[30] Damon L. Woodard,et al. Biometric Authentication and Identification using Keystroke Dynamics: A Survey , 2012 .
[31] Vir V. Phoha,et al. Which verifiers work?: A benchmark evaluation of touch-based authentication algorithms , 2013, 2013 IEEE Sixth International Conference on Biometrics: Theory, Applications and Systems (BTAS).
[32] Tim Storer,et al. A framework for continuous, transparent mobile device authentication , 2013, Comput. Secur..
[33] Michael R. Lyu,et al. Towards Continuous and Passive Authentication via Touch Biometrics: An Experimental Study on Smartphones , 2014, SOUPS.
[34] Ian T. Jolliffe,et al. Principal Component Analysis , 2002, International Encyclopedia of Statistical Science.
[35] Yang Zhang,et al. Fingerprint attack against touch-enabled devices , 2012, SPSM '12.
[36] Serge Egelman,et al. Keep on Lockin' in the Free World: A Multi-National Comparison of Smartphone Locking , 2016, CHI.
[37] René Mayrhofer,et al. An Analysis of Different Approaches to Gait Recognition Using Cell Phone Based Accelerometers , 2013, MoMM '13.
[38] Tieniu Tan,et al. Silhouette Analysis-Based Gait Recognition for Human Identification , 2003, IEEE Trans. Pattern Anal. Mach. Intell..
[39] Nir Friedman,et al. Bayesian Network Classifiers , 1997, Machine Learning.
[40] Li Lu,et al. Safeguard: User Reauthentication on Smartphones via Behavioral Biometrics , 2015, IEEE Transactions on Computational Social Systems.
[41] Paul Dowland,et al. Behaviour Profiling on Mobile Devices , 2010, 2010 International Conference on Emerging Security Technologies.
[42] Achintya Prakash,et al. Crowdsourcing Attacks on Biometric Systems , 2014, SOUPS.
[43] Xiang-Yang Li,et al. SilentSense: silent user identification via touch and movement behavioral biometrics , 2013, MobiCom.
[44] Wouter Joosen,et al. Accelerometer-Based Device Fingerprinting for Multi-factor Mobile Authentication , 2016, ESSoS.
[45] Guoliang Xue,et al. Unobservable Re-authentication for Smartphones , 2013, NDSS.
[46] Sebastian Möller,et al. On the need for different security methods on mobile phones , 2011, Mobile HCI.
[47] Alexander De Luca,et al. It's a Hard Lock Life: A Field Study of Smartphone (Un)Locking Behavior and Risk Perception , 2014, SOUPS.
[48] Rajesh Kumar,et al. Treadmill attack on gait-based authentication systems , 2015, 2015 IEEE 7th International Conference on Biometrics Theory, Applications and Systems (BTAS).
[49] Georgios Kambourakis,et al. The best of both worlds: a framework for the synergistic operation of host and cloud anomaly-based IDS for smartphones , 2014, EuroSec '14.
[50] Alexander De Luca,et al. Patterns in the wild: a field study of the usability of pattern and pin-based authentication on mobile devices , 2013, MobileHCI '13.
[51] Heikki Ailisto,et al. Identifying users of portable devices from gait pattern with accelerometers , 2005, Proceedings. (ICASSP '05). IEEE International Conference on Acoustics, Speech, and Signal Processing, 2005..
[52] Shie Mannor,et al. Activity and Gait Recognition with Time-Delay Embeddings , 2010, AAAI.
[53] Steven Furnell,et al. Authenticating mobile phone users using keystroke analysis , 2006, International Journal of Information Security.
[54] Zhigang Liu,et al. The Jigsaw continuous sensing engine for mobile phone applications , 2010, SenSys '10.
[55] Dawn Xiaodong Song,et al. Touchalytics: On the Applicability of Touchscreen Input as a Behavioral Biometric for Continuous Authentication , 2012, IEEE Transactions on Information Forensics and Security.
[56] Debin Gao,et al. I can be You: Questioning the use of Keystroke Dynamics as Biometrics , 2013, NDSS.
[57] Blase Ur,et al. Measuring password guessability for an entire university , 2013, CCS.
[58] Heinrich Hußmann,et al. Touch me once and i know it's you!: implicit authentication based on touch screen patterns , 2012, CHI.
[59] Dimitriadis Evangelos,et al. The Quest to Replace Passwords : a Framework for Comparative Evaluation of Web Authentication Schemes , 2016 .
[60] Serge Egelman,et al. The Anatomy of Smartphone Unlocking: A Field Study of Android Lock Screens , 2016, CHI.
[61] Jeremy Clark,et al. 2013 IEEE Symposium on Security and Privacy SoK: SSL and HTTPS: Revisiting past challenges and evaluating certificate trust model enhancements , 2022 .
[62] Nasir D. Memon,et al. Biometric-rich gestures: a novel approach to authentication on multi-touch devices , 2012, CHI.
[63] Heinrich Hußmann,et al. Honey, I shrunk the keys: influences of mobile devices on password composition and authentication performance , 2014, NordiCHI.
[64] Nasir D. Memon,et al. An HMM-based multi-sensor approach for continuous mobile authentication , 2015, MILCOM 2015 - 2015 IEEE Military Communications Conference.
[65] Tao Feng,et al. Continuous mobile authentication using touchscreen gestures , 2012, 2012 IEEE Conference on Technologies for Homeland Security (HST).
[66] Karin Strauss,et al. Goldilocks and the two mobile devices: going beyond all-or-nothing access to a device's applications , 2012, SOUPS.
[67] Antti Oulasvirta,et al. Free-Form Gesture Authentication in the Wild , 2016, CHI.
[68] Jun Yang,et al. SenGuard: Passive user identification on smartphones using multiple sensors , 2011, 2011 IEEE 7th International Conference on Wireless and Mobile Computing, Networking and Communications (WiMob).
[69] Wei Pan,et al. SoundSense: scalable sound sensing for people-centric applications on mobile phones , 2009, MobiSys '09.
[70] David Kotz,et al. ZEBRA: Zero-Effort Bilateral Recurring Authentication , 2014, IEEE Symposium on Security and Privacy.
[71] Frank Stajano,et al. Passwords and the evolution of imperfect authentication , 2015, Commun. ACM.
[72] Vir V. Phoha,et al. Examining a Large Keystroke Biometrics Dataset for Statistical-Attack Openings , 2013, TSEC.
[73] Heinrich Hußmann,et al. I Feel Like I'm Taking Selfies All Day!: Towards Understanding Biometric Authentication on Smartphones , 2015, CHI.
[74] Kirsi Helkala,et al. Biometric Gait Authentication Using Accelerometer Sensor , 2006, J. Comput..
[75] Vir V. Phoha,et al. When kids' toys breach mobile phone security , 2013, CCS.
[76] R. A. Leibler,et al. On Information and Sufficiency , 1951 .
[77] Mauro Conti,et al. I Sensed It Was You: Authenticating Mobile Users with Sensor-Enhanced Keystroke Dynamics , 2014, DIMVA.
[78] Prabhat Kumar,et al. A Comprehensive Study on Multifactor Authentication Schemes , 2012, ACITY.
[79] Chuan Qin,et al. Progressive Authentication: Deciding When to Authenticate on Mobile Phones , 2012, USENIX Security Symposium.
[80] Arun Ross,et al. An introduction to biometric recognition , 2004, IEEE Transactions on Circuits and Systems for Video Technology.
[81] Xiao Wang,et al. SenSec: Mobile security through passive sensing , 2013, 2013 International Conference on Computing, Networking and Communications (ICNC).
[82] Gary M. Weiss,et al. Cell phone-based biometric identification , 2010, 2010 Fourth IEEE International Conference on Biometrics: Theory, Applications and Systems (BTAS).
[83] Romit Roy Choudhury,et al. Tapprints: your finger taps have fingerprints , 2012, MobiSys '12.
[84] Muddassar Farooq,et al. Keystroke-Based User Identification on Smart Phones , 2009, RAID.
[85] Brian P. Bailey,et al. On the need for attention-aware systems: Measuring effects of interruption on task performance, error rate, and affective state , 2006, Comput. Hum. Behav..
[86] Blase Ur,et al. Biometric authentication on iPhone and Android: Usability, perceptions, and influences on adoption , 2015 .
[87] Yuan Feng,et al. Waving Authentication: Your Smartphone Authenticate You on Motion Gesture , 2015, CHI Extended Abstracts.
[88] Qing Yang,et al. HMOG: New Behavioral Biometric Features for Continuous Authentication of Smartphone Users , 2015, IEEE Transactions on Information Forensics and Security.
[89] Sunil Arya,et al. An optimal algorithm for approximate nearest neighbor searching fixed dimensions , 1998, JACM.
[90] Shari Trewin,et al. Biometric authentication on a mobile device: a study of user effort, error and task disruption , 2012, ACSAC '12.
[91] S. Holm. A Simple Sequentially Rejective Multiple Test Procedure , 1979 .
[92] René Mayrhofer,et al. Orientation Independent Cell Phone Based Gait Authentication , 2014, MoMM.
[93] N. Asokan,et al. Drone to the Rescue: Relay-Resilient Authentication using Ambient Multi-sensing , 2014, Financial Cryptography.
[94] Urs Hengartner,et al. Towards application-centric implicit authentication on smartphones , 2014, HotMobile.
[95] Lei Yang,et al. Unlocking Smart Phone through Handwaving Biometrics , 2015, IEEE Transactions on Mobile Computing.
[96] Hao Chen,et al. TouchLogger: Inferring Keystrokes on Touch Screen from Smartphone Motion , 2011, HotSec.
[97] F ChenStanley,et al. An Empirical Study of Smoothing Techniques for Language Modeling , 1996, ACL.
[98] Tempestt J. Neal,et al. Mobile device application, Bluetooth, and Wi-Fi usage data as behavioral biometric traits , 2015, 2015 IEEE 7th International Conference on Biometrics Theory, Applications and Systems (BTAS).
[99] 高田哲司,et al. "Exploring the Design Space of Graphical Passwords on Smartphones"の紹介 , 2013 .
[100] Markus Jakobsson,et al. Implicit Authentication through Learning User Behavior , 2010, ISC.
[101] Yiming Yang,et al. Introducing the Enron Corpus , 2004, CEAS.
[102] Klaus H. Hinrichs,et al. An implicit author verification system for text messages based on gesture typing biometrics , 2014, CHI.
[103] Chih-Jen Lin,et al. LIBSVM: A library for support vector machines , 2011, TIST.
[104] Alex X. Liu,et al. Secure unlocking of mobile touch screen devices by simple gestures: you can see it but you can not do it , 2013, MobiCom.
[105] Lynne Baillie,et al. Data Driven Authentication: On the Effectiveness of User Behaviour Modelling with Mobile Device Sensors , 2014, ArXiv.
[106] Sungzoon Cho,et al. Keystroke dynamics-based authentication for mobile devices , 2009, Comput. Secur..
[107] Tao Chen,et al. Creating a live, public short message service corpus: the NUS SMS corpus , 2011, Lang. Resour. Evaluation.
[108] Paul Steiner. Going beyond mobile device management , 2014 .
[109] Markus Jakobsson,et al. Implicit authentication for mobile devices , 2009 .
[110] Michael Weber,et al. Password entry usability and shoulder surfing susceptibility on different smartphone platforms , 2012, MUM.
[111] Angelos Stavrou,et al. Continuous Authentication on Mobile Devices Using Power Consumption, Touch Gestures and Physical Movement of Users , 2015, RAID.
[112] Urs Hengartner,et al. Itus: an implicit authentication framework for android , 2014, MobiCom.
[113] Lynne Baillie,et al. Why aren't Users Using Protection? Investigating the Usability of Smartphone Locking , 2015, MobileHCI.
[114] Lei Yang,et al. Accurate online power estimation and automatic battery behavior based power model generation for smartphones , 2010, 2010 IEEE/ACM/IFIP International Conference on Hardware/Software Codesign and System Synthesis (CODES+ISSS).
[115] Xi Wang,et al. An investigation on touch biometrics: Behavioral factors on screen size, physical context and application context , 2015, 2015 IEEE International Symposium on Technologies for Homeland Security (HST).
[116] David G. Stork,et al. Pattern Classification (2nd ed.) , 1999 .
[117] P.Susan Lalitha Grace,et al. Active Authentication on Mobile Devices via Stylometry, Application Usage, Web Browsing, and GPS Location , 2017 .
[118] Marios Savvides,et al. Gait-ID on the move: Pace independent human identification using cell phone accelerometer dynamics , 2012, 2012 IEEE Fifth International Conference on Biometrics: Theory, Applications and Systems (BTAS).
[119] Shridatt Sugrim,et al. User-generated free-form gestures for authentication: security and memorability , 2014, MobiSys.
[120] Urs Hengartner,et al. A Comparative Evaluation of Implicit Authentication Schemes , 2014, RAID.
[121] Reihaneh Safavi-Naini,et al. User Authentication Using Human Cognitive Abilities , 2015, Financial Cryptography.
[122] Jiang Zhu,et al. KeySens: Passive User Authentication through Micro-behavior Modeling of Soft Keyboard Interaction , 2013, MobiCASE.
[123] Donald J. Berndt,et al. Using Dynamic Time Warping to Find Patterns in Time Series , 1994, KDD Workshop.