Controlling User Access to Cloud-Connected Mobile Applications by Means of Biometrics
暂无分享,去创建一个
[1] Ning Zhang,et al. A survey on touch dynamics authentication in mobile devices , 2016, Comput. Secur..
[2] Carlos D. Castillo,et al. Unconstrained Still/Video-Based Face Verification with Deep Convolutional Neural Networks , 2016, International Journal of Computer Vision.
[3] Qing Yang,et al. HMOG: New Behavioral Biometric Features for Continuous Authentication of Smartphone Users , 2015, IEEE Transactions on Information Forensics and Security.
[4] Kim-Kwang Raymond Choo,et al. Biometrics in the Cloud: Challenges and Research Opportunities , 2017, IEEE Cloud Computing.
[5] Mojtaba Alizadeh,et al. Authentication in mobile cloud computing: A survey , 2016, J. Netw. Comput. Appl..
[6] Rama Chellappa,et al. Continuous User Authentication on Mobile Devices: Recent progress and remaining challenges , 2016, IEEE Signal Processing Magazine.
[7] Matti Pietikäinen,et al. Bi-Modal Person Recognition on a Mobile Phone: Using Mobile Phone Data , 2012, 2012 IEEE International Conference on Multimedia and Expo Workshops.
[8] Terrance E. Boult,et al. Problems and Promises of Using the Cloud and Biometrics , 2014, 2014 11th International Conference on Information Technology: New Generations.
[9] Yufei Chen,et al. Performance Analysis of Multi-Motion Sensor Behavior for Active Smartphone Authentication , 2018, IEEE Transactions on Information Forensics and Security.
[10] Soumik Mondal,et al. Performance evaluation of continuous authentication systems , 2015, IET Biom..
[11] W. Marsden. I and J , 2012 .
[12] Muttukrishnan Rajarajan,et al. A continuous user authentication scheme for mobile devices , 2016, 2016 14th Annual Conference on Privacy, Security and Trust (PST).