暂无分享,去创建一个
Xiang-Yang Li | Lan Zhang | Cheng Bo | Xiangyang Li | Cheng Bo | Lan Zhang
[1] Zhi Xu,et al. TapLogger: inferring user inputs on smartphone touchscreens using on-board motion sensors , 2012, WISEC '12.
[2] Tao Feng,et al. Continuous mobile authentication using touchscreen gestures , 2012, 2012 IEEE Conference on Technologies for Homeland Security (HST).
[3] Giacomo Boracchi,et al. Poster: fast, automatic iPhone shoulder surfing , 2011, CCS '11.
[4] Jan-Michael Frahm,et al. iSpy: automatic reconstruction of typed input from compromising reflections , 2011, CCS '11.
[5] Jun Han,et al. ACCessory: password inference using accelerometers on smartphones , 2012, HotMobile '12.
[6] Stuart E. Schechter,et al. Can i borrow your phone?: understanding concerns when sharing mobile phones , 2009, CHI.
[7] Marco Gruteser,et al. Distinguishing users with capacitive touch communication , 2012, Mobicom '12.
[8] Christopher Krügel,et al. PiOS: Detecting Privacy Leaks in iOS Applications , 2011, NDSS.
[9] Jan-Michael Frahm,et al. On the Privacy Risks of Virtual Keyboards: Automatic Reconstruction of Typed Input from Compromising Reflections , 2013, IEEE Transactions on Dependable and Secure Computing.
[10] Brian D. Noble,et al. Mobile Device Security Using Transient Authentication , 2006, IEEE Transactions on Mobile Computing.
[11] Gopal K. Gupta,et al. Identity authentication based on keystroke latencies , 1990, Commun. ACM.
[12] Adam J. Aviv,et al. Smudge Attacks on Smartphone Touch Screens , 2010, WOOT.
[13] JoyceRick,et al. Identity authentication based on keystroke latencies , 1990 .
[14] Patrick Traynor,et al. (sp)iPhone: decoding vibrations from nearby keyboards using mobile phone accelerometers , 2011, CCS '11.
[15] H. Bredin,et al. Multi-modal biometric authentication on the SecurePhone PDA , 2006 .
[16] Hai Huang,et al. You Are How You Touch: User Verification on Smartphones via Tapping Behaviors , 2014, 2014 IEEE 22nd International Conference on Network Protocols.
[17] Dawn Xiaodong Song,et al. Touchalytics: On the Applicability of Touchscreen Input as a Behavioral Biometric for Continuous Authentication , 2012, IEEE Transactions on Information Forensics and Security.
[18] Heinrich Hußmann,et al. Touch me once and i know it's you!: implicit authentication based on touch screen patterns , 2012, CHI.
[19] Romit Roy Choudhury,et al. Tapprints: your finger taps have fingerprints , 2012, MobiSys '12.
[20] Andreas P. Heiner,et al. A closer look at recognition-based graphical passwords on mobile devices , 2010, SOUPS.
[21] Feng Zhou,et al. Keyboard acoustic emanations revisited , 2005, CCS '05.
[22] Yang Zhang,et al. Fingerprint attack against touch-enabled devices , 2012, SPSM '12.
[23] Hao Chen,et al. Defending against sensor-sniffing attacks on mobile phones , 2009, MobiHeld '09.
[24] Yongdae Kim,et al. Timing attacks on PIN input devices , 2010, CCS '10.
[25] Hao Chen,et al. TouchLogger: Inferring Keystrokes on Touch Screen from Smartphone Motion , 2011, HotSec.
[26] Rakesh Agrawal,et al. Keyboard acoustic emanations , 2004, IEEE Symposium on Security and Privacy, 2004. Proceedings. 2004.
[27] Martin Vuagnoux,et al. Compromising Electromagnetic Emanations of Wired and Wireless Keyboards , 2009, USENIX Security Symposium.
[28] Eunjin Kim,et al. A Novel Biometric Identification Based on a User’s Input Pattern Analysis for Intelligent Mobile Devices , 2012 .
[29] Jun Yang,et al. SenGuard: Passive user identification on smartphones using multiple sensors , 2011, 2011 IEEE 7th International Conference on Wireless and Mobile Computing, Networking and Communications (WiMob).