暂无分享,去创建一个
[1] Yuan Feng,et al. MotionHacker: Motion sensor based eavesdropping on handwriting via smartwatch , 2018, IEEE INFOCOM 2018 - IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS).
[2] Christoph Busch,et al. Classifying accelerometer data via Hidden Markov Models to authenticate people by the way they walk , 2011, 2011 Carnahan Conference on Security Technology.
[3] Steven Furnell,et al. Advanced user authentication for mobile devices , 2007, Comput. Secur..
[4] Mahbub Hassan,et al. KEH-Gait: Using Kinetic Energy Harvesting for Gait-based User Authentication Systems , 2019, IEEE Transactions on Mobile Computing.
[5] Margit Antal,et al. Biometric Authentication Based on Touchscreen Swipe Patterns , 2016 .
[6] Mikhail I. Gofman,et al. Hidden Markov Models for feature-level fusion of biometrics on mobile devices , 2016, 2016 IEEE/ACS 13th International Conference of Computer Systems and Applications (AICCSA).
[7] Karan Singh,et al. An Intelligent Scheme for Continuous Authentication of Smartphone Using Deep Auto Encoder and Softmax Regression Model Easy for User Brain , 2019, IEEE Access.
[8] Jiang Zhu,et al. KeySens: Passive User Authentication through Micro-behavior Modeling of Soft Keyboard Interaction , 2013, MobiCASE.
[9] Jonathan Loo,et al. Continuous authentication of smartphone users based on activity pattern recognition using passive mobile sensing , 2018, J. Netw. Comput. Appl..
[10] Urs Hengartner,et al. Itus: an implicit authentication framework for android , 2014, MobiCom.
[11] Indrajit Bhattacharya,et al. Offline Signature Verification Using Pixel Matching Technique , 2013 .
[12] Ziming Zhao,et al. Picture Gesture Authentication , 2015, ACM Trans. Inf. Syst. Secur..
[13] Sanggil Kang,et al. Code authorship identification using convolutional neural networks , 2019, Future Gener. Comput. Syst..
[14] Hong Lin,et al. TDSD: A Touch Dynamic and Sensor Data Based Approach for Continuous User Authentication , 2018, PACIS.
[15] Ruby B. Lee,et al. Implicit Smartphone User Authentication with Sensors and Contextual Machine Learning , 2017, 2017 47th Annual IEEE/IFIP International Conference on Dependable Systems and Networks (DSN).
[16] Douglas A. Reynolds,et al. An overview of automatic speaker recognition technology , 2002, 2002 IEEE International Conference on Acoustics, Speech, and Signal Processing.
[17] Steven Furnell,et al. Authentication of users on mobile telephones - A survey of attitudes and practices , 2005, Comput. Secur..
[18] Mauro Conti,et al. I Sensed It Was You: Authenticating Mobile Users with Sensor-Enhanced Keystroke Dynamics , 2014, DIMVA.
[19] Dimitrios Koutsonikolas,et al. ABC: Enabling Smartphone Authentication with Built-in Camera , 2018, NDSS.
[20] Minglu Li,et al. Lip Reading-Based User Authentication Through Acoustic Sensing on Smartphones , 2019, IEEE/ACM Transactions on Networking.
[21] Aziz Mohaisen,et al. Digitalseal: a Transaction Authentication Tool for Online and Offline Transactions , 2018, 2018 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP).
[22] Xiaohong Guan,et al. Performance Analysis of Motion-Sensor Behavior for User Authentication on Smartphones , 2016, Sensors.
[23] Frankie Inguanez,et al. Multi-Model authentication using keystroke dynamics for Smartphones , 2018, 2018 IEEE 8th International Conference on Consumer Electronics - Berlin (ICCE-Berlin).
[24] Xiao Wang,et al. SenSec: Mobile security through passive sensing , 2013, 2013 International Conference on Computing, Networking and Communications (ICNC).
[25] Bin Guo,et al. A continuous smartphone authentication method based on gait patterns and keystroke dynamics , 2018, J. Ambient Intell. Humaniz. Comput..
[26] Vir V. Phoha,et al. Music and images as contexts in a context-aware touch-based authentication system , 2015, 2015 IEEE 7th International Conference on Biometrics Theory, Applications and Systems (BTAS).
[27] Michael R. Lyu,et al. Towards Continuous and Passive Authentication via Touch Biometrics: An Experimental Study on Smartphones , 2014, SOUPS.
[28] Mauro Conti,et al. On the Effectiveness of Sensor-enhanced Keystroke Dynamics Against Statistical Attacks , 2016, CODASPY.
[29] Jie Yang,et al. Hearing Your Voice is Not Enough: An Articulatory Gesture Based Liveness Detection for Voice Authentication , 2017, CCS.
[30] Gopal K. Gupta,et al. Identity authentication based on keystroke latencies , 1990, Commun. ACM.
[31] Sabah Jassim,et al. Multimodal person authentication on a smartphone under realistic conditions , 2006, SPIE Defense + Commercial Sensing.
[32] R. C. Johnson,et al. Secure voice-based authentication for mobile devices: vaulted voice verification , 2012, Defense, Security, and Sensing.
[33] Dimitrios Tzovaras,et al. Gait Matching by Mapping Wearable to Camera Privacy-Preserving Recordings: Experimental Comparison of Multiple Settings , 2019, 2019 6th International Conference on Control, Decision and Information Technologies (CoDIT).
[34] Thang Hoang,et al. Gait identification using accelerometer on mobile phone , 2012, 2012 International Conference on Control, Automation and Information Sciences (ICCAIS).
[35] Jun Zhong,et al. Towards unsupervised physical activity recognition using smartphone accelerometers , 2016, Multimedia Tools and Applications.
[36] Karen Renaud,et al. Understanding user perceptions of transparent authentication on a mobile device , 2014, Journal of Trust Management.
[37] Edward David Moreno,et al. Keystroke-based biometric authentication in mobile devices , 2011, IEEE Latin America Transactions.
[38] Fabian Monrose,et al. Keystroke dynamics as a biometric for authentication , 2000, Future Gener. Comput. Syst..
[39] Philip S. Yu,et al. DeepAuth: A Framework for Continuous User Re-authentication in Mobile Apps , 2018, CIKM.
[40] Jie Yang,et al. VoiceLive: A Phoneme Localization based Liveness Detection for Voice Authentication on Smartphones , 2016, CCS.
[41] Tao Feng,et al. Investigating Mobile Device Picking-up motion as a novel biometric modality , 2013, 2013 IEEE Sixth International Conference on Biometrics: Theory, Applications and Systems (BTAS).
[42] Einar Snekkenes,et al. Gait Recognition Using Wearable Motion Recording Sensors , 2009, EURASIP J. Adv. Signal Process..
[43] Aboul Ella Hassanien,et al. Biometric and Traditional Mobile Authentication Techniques: Overviews and Open Issues , 2014, Bio-inspiring Cyber Security and Cloud Services.
[44] Kwang-Seok Hong,et al. Multimodal biometric authentication using teeth image and voice in mobile environment , 2008, IEEE Transactions on Consumer Electronics.
[45] Lynne Baillie,et al. Data Driven Authentication: On the Effectiveness of User Behaviour Modelling with Mobile Device Sensors , 2014, ArXiv.
[46] Nathan Clarke,et al. Deployment of Keystroke Analysis on a Smartphone , 2008 .
[47] Sungzoon Cho,et al. Keystroke dynamics-based authentication for mobile devices , 2009, Comput. Secur..
[48] Christoph Busch,et al. Classification of Acceleration Data for Biometric Gait Recognition on Mobile Devices , 2011, BIOSIG.
[49] Abdulmotaleb El-Saddik,et al. User Identification Based on Handwritten Signatures with Haptic Information , 2008, EuroHaptics.
[50] Jie Liu,et al. SpeakerSense: Energy Efficient Unobtrusive Speaker Identification on Mobile Phones , 2011, Pervasive.
[51] Sheikh Iqbal Ahamed,et al. Seeing Beyond Visibility: A Four Way Fusion of User Authentication for Efficient Usable Security on Mobile Devices , 2014, 2014 IEEE Eighth International Conference on Software Security and Reliability-Companion.
[52] Biplab Sikdar,et al. Two-Factor Authentication for IoT With Location Information , 2019, IEEE Internet of Things Journal.
[53] Sharath Pankanti,et al. Biometrics: a tool for information security , 2006, IEEE Transactions on Information Forensics and Security.
[54] Krzysztof Joachimiak,et al. Model for adaptable context-based biometric authentication for mobile devices , 2016, Personal and Ubiquitous Computing.
[55] I. V. McLoughlin,et al. Keypress biometrics for user validation in mobile consumer devices , 2009, 2009 IEEE 13th International Symposium on Consumer Electronics.
[56] M. Akila,et al. Biometric personal authentication using keystroke dynamics: A review , 2011, Appl. Soft Comput..
[57] Roozbeh Jafari,et al. Orientation Independent Activity/Gesture Recognition Using Wearable Motion Sensors , 2019, IEEE Internet of Things Journal.
[58] B. Atal. Effectiveness of linear prediction characteristics of the speech wave for automatic speaker identification and verification. , 1974, The Journal of the Acoustical Society of America.
[59] Kim Schaffer. Expanding Continuous Authentication with Mobile Devices , 2015, Computer.
[60] Nathan L. Clarke,et al. The application of signature recognition to transparent handwriting verification for mobile devices , 2007, Inf. Manag. Comput. Secur..
[61] Yingnan Sun,et al. An Artificial Neural Network Framework for Gait-Based Biometrics , 2019, IEEE Journal of Biomedical and Health Informatics.
[62] S.R. Mahadeva Prasanna,et al. Multimodal biometric person authentication system using speech and signature features , 2008, TENCON 2008 - 2008 IEEE Region 10 Conference.
[63] Dijiang Huang,et al. Multifactor User Authentication with In-Air-Handwriting and Hand Geometry , 2018, 2018 International Conference on Biometrics (ICB).
[64] Qing Yang,et al. HMOG: New Behavioral Biometric Features for Continuous Authentication of Smartphone Users , 2015, IEEE Transactions on Information Forensics and Security.
[65] Yan Chen,et al. RiskCog: Unobtrusive Real-Time User Authentication on Mobile Devices in the Wild , 2020, IEEE Transactions on Mobile Computing.
[66] Davide Carneiro,et al. Continuous Authentication in Mobile Devices Using Behavioral Biometrics , 2019, ISAmI.
[67] Vivek Kanhangad,et al. Exploring orientation and accelerometer sensor data for personal authentication in smartphones using touchscreen gestures , 2015, Pattern Recognit. Lett..
[68] Jiankun Hu,et al. Continuous Authentication Using Eye Movement Response of Implicit Visual Stimuli , 2018, Proc. ACM Interact. Mob. Wearable Ubiquitous Technol..
[69] Mikhail I. Gofman,et al. Multimodal biometrics for enhanced mobile device security , 2016, Commun. ACM.
[70] Bo Yu,et al. Convolutional Neural Networks for human activity recognition using mobile sensors , 2014, 6th International Conference on Mobile Computing, Applications and Services.
[71] Susmita Sur-Kolay,et al. CABA: Continuous Authentication Based on BioAura , 2017, IEEE Transactions on Computers.
[72] Heikki Ailisto,et al. Identifying users of portable devices from gait pattern with accelerometers , 2005, Proceedings. (ICASSP '05). IEEE International Conference on Acoustics, Speech, and Signal Processing, 2005..
[73] Alireza Sahami Shirazi,et al. Assessing the vulnerability of magnetic gestural authentication to video-based shoulder surfing attacks , 2012, CHI.
[74] Heinrich Hußmann,et al. Touch me once and i know it's you!: implicit authentication based on touch screen patterns , 2012, CHI.
[75] Bruno Crispo,et al. DIALERAUTH: A Motion-assisted Touch-based Smartphone User Authentication Scheme , 2018, CODASPY.
[76] Gonzalo Bailador,et al. A Real-Time In-Air Signature Biometric Technique Using a Mobile Device Embedding an Accelerometer , 2010, NDT.
[77] Kiran B. Raja,et al. Fusion of face and periocular information for improved authentication on smartphones , 2015, 2015 18th International Conference on Information Fusion (Fusion).
[78] Burak Kantarci,et al. Gesture and Sociability-based Continuous Authentication on Smart Mobile Devices , 2018, MobiWac.
[79] Bojan Cukic,et al. Touch gesture-based authentication on mobile devices: The effects of user posture, device size, configuration, and inter-session variability , 2019, J. Syst. Softw..
[80] Yufei Chen,et al. Performance Analysis of Multi-Motion Sensor Behavior for Active Smartphone Authentication , 2018, IEEE Transactions on Information Forensics and Security.
[81] Samad Ahmadi,et al. Securing smartphones via typing heat maps , 2016, 2016 IEEE 6th International Conference on Consumer Electronics - Berlin (ICCE-Berlin).
[82] Shan Chang,et al. ShakeIn: Secure User Authentication of Smartphones with Single-Handed Shakes , 2017, IEEE Transactions on Mobile Computing.
[83] Ozlem Durmaz Incel,et al. Towards Continuous Authentication on Mobile Phones using Deep Learning Models , 2019, Procedia Computer Science.
[84] Charles C. Tappert,et al. A Behavioral Biometrics User Authentication Study Using Motion Data from Android Smartphones , 2016, 2016 European Intelligence and Security Informatics Conference (EISIC).
[85] Kiran B. Raja,et al. Feature level fused templates for multi-biometric system on smartphones , 2017, 2017 5th International Workshop on Biometrics and Forensics (IWBF).
[86] Rytis Maskeliunas,et al. Smartphone User Identity Verification Using Gait Characteristics , 2016, Symmetry.
[87] Arun Ross,et al. An introduction to biometric recognition , 2004, IEEE Transactions on Circuits and Systems for Video Technology.
[88] Haizhou Li,et al. An overview of text-independent speaker recognition: From features to supervectors , 2010, Speech Commun..
[89] Tempestt J. Neal,et al. Surveying Biometric Authentication for Mobile Device Security , 2016 .
[90] Satyajit Das,et al. Medical diagnosis with the aid of using fuzzy logic and intuitionistic fuzzy logic , 2016, Applied Intelligence.
[91] Tao Feng,et al. TIPS: context-aware implicit user identification using touch screen in uncontrolled environments , 2014, HotMobile.
[92] Soumik Mondal,et al. Continuous authentication and identification for mobile devices: Combining security and forensics , 2015, 2015 IEEE International Workshop on Information Forensics and Security (WIFS).
[93] Zhen Yu,et al. Usable Authentication Mechanisms for Mobile Devices: An Exploration of 3D Graphical Passwords , 2016, 2016 International Conference on Platform Technology and Service (PlatCon).
[94] Lina Yao,et al. Inferring User Profile Attributes From Multidimensional Mobile Phone Sensory Data , 2019, IEEE Internet of Things Journal.
[95] Soumik Mondal,et al. Swipe gesture based Continuous Authentication for mobile devices , 2015, 2015 International Conference on Biometrics (ICB).
[96] William Melicher,et al. Passive user identification using sequential analysis of proximity information in touchscreen usage patterns , 2015, 2015 Eighth International Conference on Mobile Computing and Ubiquitous Networking (ICMU).
[97] Adam J. Aviv,et al. Smudge Attacks on Smartphone Touch Screens , 2010, WOOT.
[98] Georgios Kambourakis,et al. Introducing touchstroke: keystroke-based authentication system for smartphones , 2016, Secur. Commun. Networks.
[99] Maria Papadaki,et al. Active authentication for mobile devices utilising behaviour profiling , 2014, International Journal of Information Security.
[100] Patrick Bours,et al. Studying WiFi and Accelerometer Data Based Authentication Method on Mobile Phones , 2018, ICBEA '18.
[101] Tim Storer,et al. A framework for continuous, transparent mobile device authentication , 2013, Comput. Secur..
[102] H. Saevanee,et al. User Authentication Using Combination of Behavioral Biometrics over the Touchpad Acting Like Touch Screen of Mobile Device , 2008, 2008 International Conference on Computer and Electrical Engineering.
[103] Yiran Chen,et al. SlowMo - enhancing mobile gesture-based authentication schemes via sampling rate optimization , 2016, 2016 21st Asia and South Pacific Design Automation Conference (ASP-DAC).
[104] Muddassar Farooq,et al. Keystroke-Based User Identification on Smart Phones , 2009, RAID.
[105] Chris Bevan,et al. Different strokes for different folks? Revealing the physical characteristics of smartphone users from their swipe gestures , 2016, Int. J. Hum. Comput. Stud..
[106] Xinwen Fu,et al. CIM: Camera in Motion for Smartphone Authentication , 2019, IEEE Transactions on Information Forensics and Security.
[107] Ruili Wang,et al. Speaker identification features extraction methods: A systematic review , 2017, Expert Syst. Appl..
[108] Yuan Feng,et al. Waving Authentication: Your Smartphone Authenticate You on Motion Gesture , 2015, CHI Extended Abstracts.
[109] Julian Fiérrez,et al. Towards mobile authentication using dynamic signature verification: Useful features and performance evaluation , 2008, 2008 19th International Conference on Pattern Recognition.
[110] Dae Jung Kim,et al. A Multisensor Mobile Interface for Industrial Environment and Healthcare Monitoring , 2017, IEEE Transactions on Industrial Electronics.
[111] Tempestt J. Neal,et al. Mobile device application, Bluetooth, and Wi-Fi usage data as behavioral biometric traits , 2015, 2015 IEEE 7th International Conference on Biometrics Theory, Applications and Systems (BTAS).
[112] Zulfiqar Ali Memon,et al. Biometric authentication technique using smartphone sensor , 2016, 2016 13th International Bhurban Conference on Applied Sciences and Technology (IBCAST).
[113] Aziz Mohaisen,et al. Large-Scale and Language-Oblivious Code Authorship Identification , 2018, CCS.
[114] Aziz Mohaisen,et al. Two-Thumbs-Up: Physical protection for PIN entry secure against recording attacks , 2018, Comput. Secur..
[115] Urs Hengartner,et al. Towards application-centric implicit authentication on smartphones , 2014, HotMobile.
[116] Heikki Ailisto,et al. Unobtrusive Multimodal Biometrics for Ensuring Privacy and Information Security with Personal Devices , 2006, Pervasive.
[117] Antti Oulasvirta,et al. Free-Form Gesture Authentication in the Wild , 2016, CHI.
[118] Andrew Beng Jin Teoh,et al. A Survey of Keystroke Dynamics Biometrics , 2013, TheScientificWorldJournal.
[119] Gianni Fenu,et al. Controlling User Access to Cloud-Connected Mobile Applications by Means of Biometrics , 2018, IEEE Cloud Computing.
[120] Julian Fiérrez,et al. MultiLock: Mobile Active Authentication based on Multiple Biometric and Behavioral Patterns , 2019, Advanced Sciences and Technologies for Security Applications.
[121] Delphine Reinhardt,et al. Pick Me Up and I Will Tell You Who You Are: Analyzing Pick-Up Motions to Authenticate Users , 2018, 2018 IEEE International Conference on Pervasive Computing and Communications Workshops (PerCom Workshops).
[122] Dimitrios Tzovaras,et al. Activity and Event Related Biometrics , 2012 .
[123] Zheng Yan,et al. A Usable Authentication System Based on Personal Voice Challenge , 2016, 2016 International Conference on Advanced Cloud and Big Data (CBD).
[124] Abdulmotaleb El-Saddik,et al. ECG Authentication for Mobile Devices , 2016, IEEE Transactions on Instrumentation and Measurement.
[125] Fan Ye,et al. Multi-Modal Face Authentication using Deep Visual and Acoustic Features , 2019, ICC 2019 - 2019 IEEE International Conference on Communications (ICC).
[126] Li Yang,et al. MineAuth: Mining Behavioural Habits for Continuous Authentication on a Smartphone , 2019, ACISP.
[127] Soumik Mondal,et al. Person Identification by Keystroke Dynamics Using Pairwise User Coupling , 2017, IEEE Transactions on Information Forensics and Security.
[128] Jain-Shing Wu,et al. Smartphone continuous authentication based on keystroke and gesture profiling , 2015, 2015 International Carnahan Conference on Security Technology (ICCST).
[129] Florian Alt,et al. GazeTouchPass: Multimodal Authentication Using Gaze and Touch on Mobile Devices , 2016, CHI Extended Abstracts.
[130] Judith Liu-Jimenez,et al. Gait recognition using smartphone , 2016, 2016 IEEE International Carnahan Conference on Security Technology (ICCST).
[131] Abeer Alsadoon,et al. Designing Touch-Based Hybrid Authentication Method for Smartphones , 2015 .
[132] Lynne Baillie,et al. Sensor use and usefulness: Trade-offs for data-driven authentication on mobile devices , 2015, 2015 IEEE International Conference on Pervasive Computing and Communications (PerCom).
[133] Deron Liang,et al. A New Non-Intrusive Authentication Method Based on the Orientation Sensor for Smartphone Users , 2012, 2012 IEEE Sixth International Conference on Software Security and Reliability.
[134] Maurizio Rebaudengo,et al. On gait recognition with smartphone accelerometer , 2015, 2015 4th Mediterranean Conference on Embedded Computing (MECO).
[135] Hao Chen,et al. TouchLogger: Inferring Keystrokes on Touch Screen from Smartphone Motion , 2011, HotSec.
[136] Feng Hong,et al. MGRA: Motion Gesture Recognition via Accelerometer , 2016, Sensors.
[137] Kiran B. Raja,et al. Multi-modal authentication system for smartphones using face, iris and periocular , 2015, 2015 International Conference on Biometrics (ICB).
[138] Gang Qian,et al. People Identification Using Gait Via Floor Pressure Sensing and Analysis , 2008, EuroSSC.
[139] Ryuya Uda,et al. Personal Identification by Flick Input Using Self-Organizing Maps with Acceleration Sensor and Gyroscope , 2016, IMCOM.
[140] Tieniu Tan,et al. Fusion of static and dynamic body biometrics for gait recognition , 2004, IEEE Trans. Circuits Syst. Video Technol..
[141] Gang Zhou,et al. Using Data Augmentation in Continuous Authentication on Smartphones , 2019, IEEE Internet of Things Journal.
[142] Yong Man Ro,et al. Multimodal Face Biometrics by Using Convolutional Neural Networks , 2017 .
[143] Ying Wah Teh,et al. Deep learning algorithms for human activity recognition using mobile and wearable sensor networks: State of the art and research challenges , 2018, Expert Syst. Appl..
[144] Guest Richard,et al. Interaction evaluation of a mobile voice authentication system , 2016 .
[145] Thuc Dinh Nguyen,et al. Adaptive Cross-Device Gait Recognition Using a Mobile Accelerometer , 2013, J. Inf. Process. Syst..
[146] Richard M. Guest,et al. Predicting sex as a soft-biometrics from device interaction swipe gestures , 2016, Pattern Recognit. Lett..
[147] Wenyao Xu,et al. EyeVeri: A secure and usable approach for smartphone user authentication , 2016, IEEE INFOCOM 2016 - The 35th Annual IEEE International Conference on Computer Communications.
[148] Ruby B. Lee,et al. Multi-sensor authentication to improve smartphone security , 2015, 2015 International Conference on Information Systems Security and Privacy (ICISSP).
[149] Aziz Mohaisen,et al. Keylogging-Resistant Visual Authentication Protocols , 2014, IEEE Transactions on Mobile Computing.
[150] René Mayrhofer,et al. An Analysis of Different Approaches to Gait Recognition Using Cell Phone Based Accelerometers , 2013, MoMM '13.
[151] Yu Guan,et al. Mobile Based Continuous Authentication Using Deep Features , 2018, EMDL@MobiSys.
[152] Li Lu,et al. Safeguard: User Reauthentication on Smartphones via Behavioral Biometrics , 2015, IEEE Transactions on Computational Social Systems.
[153] Zhide Chen,et al. An Implicit Identity Authentication System Considering Changes of Gesture Based on Keystroke Behaviors , 2015, Int. J. Distributed Sens. Networks.
[154] Siome Goldenstein,et al. User-Centric Coordinates for Applications Leveraging 3-Axis Accelerometer Data , 2017, IEEE Sensors Journal.
[155] Christoph Busch,et al. Authentication of Smartphone Users Based on the Way They Walk Using k-NN Algorithm , 2012, 2012 Eighth International Conference on Intelligent Information Hiding and Multimedia Signal Processing.
[156] Xiangyang Luo,et al. VoicePop: A Pop Noise based Anti-spoofing System for Voice Authentication on Smartphones , 2019, IEEE INFOCOM 2019 - IEEE Conference on Computer Communications.
[157] Maurizio Talamo,et al. Movement based biometric authentication with smartphones , 2015, 2015 International Carnahan Conference on Security Technology (ICCST).
[158] Christoph Busch,et al. Unobtrusive User-Authentication on Mobile Phones Using Biometric Gait Recognition , 2010, 2010 Sixth International Conference on Intelligent Information Hiding and Multimedia Signal Processing.
[159] Vinny Cahill,et al. A framework for developing mobile, context-aware applications , 2004, Second IEEE Annual Conference on Pervasive Computing and Communications, 2004. Proceedings of the.
[160] Ming-Hung Shih,et al. A flick biometric authentication mechanism on mobile devices , 2015, 2015 International Conference on Informative and Cybernetics for Computational Social Systems (ICCSS).
[161] Steven Furnell,et al. Continuous and transparent multimodal authentication: reviewing the state of the art , 2015, Cluster Computing.
[162] Steven Furnell,et al. Continuous user authentication using multi-modal biometrics , 2015, Comput. Secur..
[163] Jong Hyuk Park,et al. Design and Implementation of Improved Authentication System for Android Smartphone Users , 2012, 2012 26th International Conference on Advanced Information Networking and Applications Workshops.
[164] Tanapat Anusas-Amornkul. Strengthening Password Authentication using Keystroke Dynamics and Smartphone Sensors , 2019, ICICM 2019.
[165] Jugal K. Kalita,et al. Authentication of Smartphone Users Using Behavioral Biometrics , 2016, IEEE Communications Surveys & Tutorials.
[166] Thuc Dinh Nguyen,et al. Gait authentication on mobile phone using biometric cryptosystem and fuzzy commitment scheme , 2015, International Journal of Information Security.
[167] T. Santhanam,et al. Keystroke dynamics for biometric authentication — A survey , 2013, 2013 International Conference on Pattern Recognition, Informatics and Mobile Engineering.
[168] Douglas A. Reynolds,et al. Speaker Verification Using Adapted Gaussian Mixture Models , 2000, Digit. Signal Process..
[169] Christoph Busch,et al. Scenario test of accelerometer-based biometric gait recognition , 2011, 2011 Third International Workshop on Security and Communication Networks (IWSCN).
[170] Xiaohong Guan,et al. Performance Analysis of Touch-Interaction Behavior for Active Smartphone Authentication , 2016, IEEE Transactions on Information Forensics and Security.
[171] Richard E. Ladner,et al. PassChords: secure multi-touch authentication for blind people , 2012, ASSETS '12.
[172] Yong Qi,et al. Towards a User-Friendly and Secure Hand Shaking Authentication for Smartphones , 2018, 2018 17th IEEE International Conference On Trust, Security And Privacy In Computing And Communications/ 12th IEEE International Conference On Big Data Science And Engineering (TrustCom/BigDataSE).
[173] Steven Furnell,et al. Beyond the PIN: Enhancing user authentication for mobile devices , 2008 .
[174] Gonzalo Bailador,et al. Speed-Independent Gait Identification for Mobile Devices , 2012, Int. J. Pattern Recognit. Artif. Intell..