Your song your way: Rhythm-based two-factor authentication for multi-touch mobile devices
暂无分享,去创建一个
Rui Zhang | Yanchao Zhang | Yimin Chen | Jingchao Sun | Jingchao Sun | Yanchao Zhang | Rui Zhang | Yimin Chen
[1] Guoliang Xue,et al. Unobservable Re-authentication for Smartphones , 2013, NDSS.
[2] Chih-Jen Lin,et al. LIBSVM: A library for support vector machines , 2011, TIST.
[3] Alex X. Liu,et al. Secure unlocking of mobile touch screen devices by simple gestures: you can see it but you can not do it , 2013, MobiCom.
[4] Jacob O. Wobbrock,et al. TapSongs: tapping rhythm-based passwords on a single binary sensor , 2009, UIST '09.
[5] Markus Jakobsson,et al. Implicit authentication for mobile devices , 2009 .
[6] Sean White,et al. RhythmLink: securely pairing I/O-constrained devices by tapping , 2011, UIST.
[7] Rui Zhang,et al. TouchIn: Sightless two-factor authentication on multi-touch mobile devices , 2014, 2014 IEEE Conference on Communications and Network Security.
[8] Shridatt Sugrim,et al. User-generated free-form gestures for authentication: security and memorability , 2014, MobiSys.
[9] Xiaoli Zhang,et al. User Identification Based on Touch Dynamics , 2012, 2012 9th International Conference on Ubiquitous Intelligence and Computing and 9th International Conference on Autonomic and Trusted Computing.
[10] Einar Snekkenes,et al. Spoof Attacks on Gait Authentication System , 2007, IEEE Transactions on Information Forensics and Security.
[11] Hai Huang,et al. You Are How You Touch: User Verification on Smartphones via Tapping Behaviors , 2014, 2014 IEEE 22nd International Conference on Network Protocols.
[12] Luís Carriço,et al. Under the table: tap authentication for smartphones , 2013, BCS HCI.
[13] Adam J. Aviv,et al. Smudge Attacks on Smartphone Touch Screens , 2010, WOOT.
[14] Marco Gruteser,et al. Distinguishing users with capacitive touch communication , 2012, Mobicom '12.
[15] Dan Boneh,et al. Mobile token-based authentication on a budget , 2011, HotMobile '11.
[16] Markus Dürmuth,et al. Quantifying the security of graphical passwords: the case of android unlock patterns , 2013, CCS.
[17] Heikki Ailisto,et al. Identifying users of portable devices from gait pattern with accelerometers , 2005, Proceedings. (ICASSP '05). IEEE International Conference on Acoustics, Speech, and Signal Processing, 2005..
[18] Heinrich Hußmann,et al. Touch me once and i know it's you!: implicit authentication based on touch screen patterns , 2012, CHI.
[19] Markus Jakobsson,et al. Implicit Authentication through Learning User Behavior , 2010, ISC.
[20] Vir V. Phoha,et al. When kids' toys breach mobile phone security , 2013, CCS.
[21] Nasir D. Memon,et al. Biometric-rich gestures: a novel approach to authentication on multi-touch devices , 2012, CHI.