Surveying the Development of Biometric User Authentication on Mobile Phones
暂无分享,去创建一个
Steven Furnell | Duncan S. Wong | Jianying Zhou | Weizhi Meng | D. Wong | Jianying Zhou | S. Furnell | W. Meng
[1] Robert H. Deng,et al. Understanding OSN-based facial disclosure against face authentication systems , 2014, AsiaCCS.
[2] Jifeng Dai,et al. Multifeature-Based High-Resolution Palmprint Recognition , 2011, IEEE Transactions on Pattern Analysis and Machine Intelligence.
[3] Endra,et al. Online Signature Verification on Mobile Devices , 2015 .
[4] A. Ant Ozok,et al. A comparison of perceived and real shoulder-surfing risks between alphanumeric and graphical passwords , 2006, SOUPS '06.
[5] Kang Ryoung Park,et al. A Study on Iris Localization and Recognition on Mobile Phones , 2008, EURASIP J. Adv. Signal Process..
[6] Chuan Qin,et al. Progressive Authentication: Deciding When to Authenticate on Mobile Phones , 2012, USENIX Security Symposium.
[7] Alex X. Liu,et al. Secure unlocking of mobile touch screen devices by simple gestures: you can see it but you can not do it , 2013, MobiCom.
[8] Albrecht Schmidt,et al. SmudgeSafe: geometric image transformations for smudge-resistant user authentication , 2014, UbiComp.
[9] Tsuyoshi Isshiki,et al. Narrow Fingerprint Sensor Verification with Template Updating Technique , 2012, IEICE Trans. Fundam. Electron. Commun. Comput. Sci..
[10] J. Wixted. The psychology and neuroscience of forgetting. , 2004, Annual review of psychology.
[11] Robert H. Deng,et al. A Generic Framework for Three-Factor Authentication: Preserving Security and Privacy in Distributed Systems , 2011, IEEE Transactions on Parallel and Distributed Systems.
[12] Alan S. Brown,et al. Generating and remembering passwords , 2004 .
[13] Kwang-Seok Hong,et al. Teeth recognition based on multiple attempts in mobile device , 2010, J. Netw. Comput. Appl..
[14] Nathan Clarke,et al. Deployment of Keystroke Analysis on a Smartphone , 2008 .
[15] Gonzalo Bailador,et al. Speed-Independent Gait Identification for Mobile Devices , 2012, Int. J. Pattern Recognit. Artif. Intell..
[16] Sungzoon Cho,et al. Keystroke dynamics-based authentication for mobile devices , 2009, Comput. Secur..
[17] Duncan S. Wong,et al. The effect of adaptive mechanism on behavioural biometric based mobile phone authentication , 2014, Inf. Manag. Comput. Secur..
[18] Prasant Mohapatra,et al. Sensor-assisted facial recognition: an enhanced biometric authentication system for smartphones , 2014, MobiSys.
[19] Aaron Adler,et al. Can images be regenerated from biometric templates , 2003 .
[20] F. Roli,et al. Security evaluation of biometric authentication systems under real spoofing attacks , 2012, IET Biom..
[21] Steven Furnell,et al. Advanced user authentication for mobile devices , 2007, Comput. Secur..
[22] George Lawton. Is It Finally Time to Worry about Mobile Malware? , 2008, Computer.
[23] Alessandro Neri,et al. Keystroke dynamics authentication for mobile phones , 2011, SAC.
[24] René Mayrhofer,et al. Towards pan shot face unlock: Using biometric face information from different perspectives to unlock mobile devices , 2013, Int. J. Pervasive Comput. Commun..
[25] Dawn Xiaodong Song,et al. Timing Analysis of Keystrokes and Timing Attacks on SSH , 2001, USENIX Security Symposium.
[26] Sven G. Kratz,et al. AirAuth: a biometric authentication system using in-air hand gestures , 2014, CHI Extended Abstracts.
[27] Emiliano Miluzzo,et al. A survey of mobile phone sensing , 2010, IEEE Communications Magazine.
[28] Nathan Clarke,et al. Behaviour profiling for transparent authentication for mobile devices , 2011, ECIW 2011 2011.
[29] Xuan Huang,et al. Development of a Typing Behaviour Recognition Mechanism on Android , 2012, 2012 IEEE 11th International Conference on Trust, Security and Privacy in Computing and Communications.
[30] Georgios Kambourakis,et al. Exposing mobile malware from the inside (or what is your mobile app really doing?) , 2014, Peer-to-Peer Netw. Appl..
[31] Maria Papadaki,et al. Evaluation of anomaly-based IDS for mobile devices using machine learning classifiers , 2012, Secur. Commun. Networks.
[32] Cevat Ikibas,et al. A personal identification system using retinal vasculature in retinal fundus images , 2011, Expert Syst. Appl..
[33] Lee Luan Ling,et al. Biometric Access Control Through Numerical Keyboards Based on Keystroke Dynamics , 2006, ICB.
[34] Natalia A. Schmid,et al. Performance analysis of iris-based identification system at the matching score level , 2006, IEEE Trans. Inf. Forensics Secur..
[35] Kwang-Seok Hong,et al. Multimodal biometric authentication using teeth image and voice in mobile environment , 2008, IEEE Transactions on Consumer Electronics.
[36] Shari Trewin,et al. Biometric authentication on a mobile device: a study of user effort, error and task disruption , 2012, ACSAC '12.
[37] Duncan S. Wong,et al. Touch Gestures Based Biometric Authentication Scheme for Touchscreen Mobile Phones , 2012, Inscrypt.
[38] Lin Sun,et al. Eyeblink-based Anti-Spoofing in Face Recognition from a Generic Webcamera , 2007, 2007 IEEE 11th International Conference on Computer Vision.
[39] Shumin Zhai,et al. Smart phone use by non-mobile business users , 2011, Mobile HCI.
[40] Hao Chen,et al. TouchLogger: Inferring Keystrokes on Touch Screen from Smartphone Motion , 2011, HotSec.
[41] Lei Chen,et al. Preventing Cell Phone Intrusion and Theft using Biometrics , 2013, 2013 IEEE Security and Privacy Workshops.
[42] Reihaneh Safavi-Naini,et al. Cancelable Key-Based Fingerprint Templates , 2005, ACISP.
[43] René Mayrhofer,et al. An Analysis of Different Approaches to Gait Recognition Using Cell Phone Based Accelerometers , 2013, MoMM '13.
[44] Christoph Busch,et al. Using Hidden Markov Models for accelerometer-based biometric gait recognition , 2011, 2011 IEEE 7th International Colloquium on Signal Processing and its Applications.
[45] Sharath Pankanti,et al. BIOMETRIC IDENTIFICATION , 2000 .
[46] Lin Sun,et al. Monocular camera-based face liveness detection by combining eyeblink and scene context , 2011, Telecommun. Syst..
[47] Miao Wang,et al. Mobile Authentication through Touch-Behavior Features , 2013, CCBR.
[48] Jun Han,et al. ACCessory: password inference using accelerometers on smartphones , 2012, HotMobile '12.
[49] G. Padmavathi,et al. Next generation biometric security system: an approach for mobile device security , 2012, CCSEIT '12.
[50] Georgios Kambourakis,et al. A cloud-based architecture to crowdsource mobile app privacy leaks , 2014, Panhellenic Conference on Informatics.
[51] Heather Crawford. Keystroke dynamics: Characteristics and opportunities , 2010, 2010 Eighth International Conference on Privacy, Security and Trust.
[52] XiaoFeng Wang,et al. Upgrading Your Android, Elevating My Malware: Privilege Escalation through Mobile OS Updating , 2014, 2014 IEEE Symposium on Security and Privacy.
[53] DAVID ZHANG,et al. A Comparative Study of Palmprint Recognition Algorithms , 2012, CSUR.
[54] Haining Wang,et al. An efficient user verification system via mouse movements , 2011, CCS '11.
[55] Neng Gao,et al. Remotely wiping sensitive data on stolen smartphones , 2014, AsiaCCS.
[56] Guoliang Xue,et al. Unobservable Re-authentication for Smartphones , 2013, NDSS.
[57] Muhammad Ali Akbar,et al. Secure biometric template generation for multi-factor authentication , 2015, Pattern Recognit..
[58] Mohammad Omar Derawi. Biometric options for mobile phone authentication , 2011 .
[59] Michel Barbeau,et al. Anomaly-based intrusion detection using mobility profiles of public transportation users , 2005, WiMob'2005), IEEE International Conference on Wireless And Mobile Computing, Networking And Communications, 2005..
[60] Jun Yang,et al. SenGuard: Passive user identification on smartphones using multiple sensors , 2011, 2011 IEEE 7th International Conference on Wireless and Mobile Computing, Networking and Communications (WiMob).
[61] Raul Sánchez-Reillo,et al. Handwritten signature recognition in mobile scenarios: Performance evaluation , 2012, 2012 IEEE International Carnahan Conference on Security Technology (ICCST).
[62] Christoph Busch,et al. Fingerprint Recognition with Embedded Cameras on Mobile Phones , 2011, MobiSec.
[63] Amitava Das,et al. Multilingual spoken-password based user authentication in emerging economies using cellular phone networks , 2008, 2008 IEEE Spoken Language Technology Workshop.
[64] Abdul Serwadda,et al. Using global knowledge of users' typing traits to attack keystroke biometrics templates , 2011, MM&Sec '11.
[65] Ahmed Awad E. Ahmed,et al. A New Biometric Technology Based on Mouse Dynamics , 2007, IEEE Transactions on Dependable and Secure Computing.
[66] Steven Furnell,et al. Acceptance of Subscriber Authentication Methods For Mobile Telephony Devices , 2002, Comput. Secur..
[67] Hao Chen,et al. Defending against sensor-sniffing attacks on mobile phones , 2009, MobiHeld '09.
[68] Roy A. Maxion,et al. Keystroke biometrics with number-pad input , 2010, 2010 IEEE/IFIP International Conference on Dependable Systems & Networks (DSN).
[69] Babak Naderi,et al. Magnetic signatures in air for mobile devices , 2012, Mobile HCI.
[70] Inwhee Joe,et al. Design of remote control system for data protection and backup in mobile devices , 2011, The 4th International Conference on Interaction Sciences.
[71] Christophe Rosenberger,et al. Challenge-based speaker recognition for mobile authentication , 2012, 2012 BIOSIG - Proceedings of the International Conference of Biometrics Special Interest Group (BIOSIG).
[72] Adam J. Aviv,et al. Smudge Attacks on Smartphone Touch Screens , 2010, WOOT.
[73] L. E. Myers. An Exploration of Voice Biometrics , 2004 .
[74] Yongdae Kim,et al. Timing attacks on PIN input devices , 2010, CCS '10.
[75] Khalid Airowaily,et al. Oily Residuals Security Threat on Smart Phones , 2011, 2011 First International Conference on Robot, Vision and Signal Processing.
[76] Michal Choras,et al. Contactless palmprint and knuckle biometrics for mobile devices , 2011, Pattern Analysis and Applications.
[77] Alex Park,et al. Multimodal Face and Speaker Identification for Mobile Devices , 2007 .
[78] Sancheng Peng,et al. Smartphone Malware and Its Propagation Modeling: A Survey , 2014, IEEE Communications Surveys & Tutorials.
[79] Kwang-Seok Hong,et al. Person authentication using face, teeth and voice modalities for mobile device security , 2010, IEEE Transactions on Consumer Electronics.
[80] Julian Ashbourn. Biometrics in the New World , 2014, Springer International Publishing.
[81] Sahin Albayrak,et al. Monitoring Smartphones for Anomaly Detection , 2008, Mob. Networks Appl..
[82] Julian Fiérrez,et al. Towards mobile authentication using dynamic signature verification: Useful features and performance evaluation , 2008, 2008 19th International Conference on Pattern Recognition.
[83] Theresa C McLoud,et al. Voice Recognition , 2009, Encyclopedia of Biometrics.
[84] R. Shepard. Recognition memory for words, sentences, and pictures , 1967 .
[85] Brett Beranek. Voice biometrics: success stories, success factors and what's next , 2013 .
[86] Yajin Zhou,et al. Dissecting Android Malware: Characterization and Evolution , 2012, 2012 IEEE Symposium on Security and Privacy.
[87] Jiang Zhu,et al. KeySens: Passive User Authentication through Micro-behavior Modeling of Soft Keyboard Interaction , 2013, MobiCASE.
[88] Jun Han,et al. ACComplice: Location inference using accelerometers on smartphones , 2012, 2012 Fourth International Conference on Communication Systems and Networks (COMSNETS 2012).
[89] Andreas P. Heiner,et al. A closer look at recognition-based graphical passwords on mobile devices , 2010, SOUPS.
[90] Erik Wästlund,et al. Exploring Touch-Screen Biometrics for User Identification on Smart Phones , 2011, PrimeLife.
[91] Claudia Picardi,et al. User authentication through keystroke dynamics , 2002, TSEC.
[92] Ashish Jain,et al. A new mobile biometric based upon usage context , 2013, 2013 IEEE International Conference on Technologies for Homeland Security (HST).
[93] Feng Zhou,et al. Keyboard acoustic emanations revisited , 2005, CCS '05.
[94] Jie Wu,et al. SafeCode - Safeguarding Security and Privacy of User Data on Stolen iOS Devices , 2012, CSS.
[95] Julian Fiérrez,et al. Direct Attacks Using Fake Images in Iris Verification , 2008, BIOID.
[96] Yang Zhang,et al. Fingerprint attack against touch-enabled devices , 2012, SPSM '12.
[97] Julian Ashbourn. Biometrics in the New World: The Cloud, Mobile Technology and Pervasive Identity , 2014 .
[98] Chulhan Lee,et al. Alignment-Free Cancelable Fingerprint Templates Based on Local Minutiae Information , 2007, IEEE Transactions on Systems, Man, and Cybernetics, Part B (Cybernetics).
[99] Tao Feng,et al. Continuous Mobile Authentication Using Virtual Key Typing Biometrics , 2013, 2013 12th IEEE International Conference on Trust, Security and Privacy in Computing and Communications.
[100] Robert H. Deng,et al. Designing leakage-resilient password entry on touchscreen mobile devices , 2013, ASIA CCS '13.
[101] Michele Nappi,et al. FIRME: Face and Iris Recognition for Mobile Engagement , 2014, Image Vis. Comput..
[102] Steven Furnell,et al. Keystroke dynamics on a mobile handset: a feasibility study , 2003, Inf. Manag. Comput. Secur..
[103] Stuart E. Schechter,et al. Can i borrow your phone?: understanding concerns when sharing mobile phones , 2009, CHI.
[104] Adam J. Aviv,et al. Practicality of accelerometer side channels on smartphones , 2012, ACSAC '12.
[105] Duncan S. Wong,et al. Design of touch dynamics based user authentication with an adaptive mechanism on mobile phones , 2014, SAC.
[106] Nasir D. Memon,et al. Biometric-rich gestures: a novel approach to authentication on multi-touch devices , 2012, CHI.
[107] Václav Matyás,et al. Toward Reliable User Authentication through Biometrics , 2003, IEEE Secur. Priv..
[108] Georgios Kambourakis,et al. iSAM: An iPhone Stealth Airborne Malware , 2011, SEC.
[109] Rui Zhang,et al. TouchIn: Sightless two-factor authentication on multi-touch mobile devices , 2014, 2014 IEEE Conference on Communications and Network Security.
[110] Urs Hengartner,et al. Itus: an implicit authentication framework for android , 2014, MobiCom.
[111] Alex Pentland,et al. Reality mining: sensing complex social systems , 2006, Personal and Ubiquitous Computing.
[112] Aditya Pabbaraju,et al. Face Recognition in Mobile Devices , 2010 .
[113] Michael K. Reiter,et al. Password hardening based on keystroke dynamics , 2002, International Journal of Information Security.
[114] Yair Frankel,et al. On enabling secure applications through off-line biometric identification , 1998, Proceedings. 1998 IEEE Symposium on Security and Privacy (Cat. No.98CB36186).
[115] Paolo Abeni,et al. NIS03-4: Implementing Biometrics-Based Authentication for Mobile Devices , 2006, IEEE Globecom 2006.
[116] Penny Khaw. Iris Recognition Technology for Improved Authentication , 2002 .
[117] Paulo Lobato Correia,et al. Smartphone-based palmprint recognition system , 2014, 2014 21st International Conference on Telecommunications (ICT).
[118] Anil K. Jain. Biometric Recognition: Overview and Recent Advances , 2007, CIARP.
[119] Tao Zhang,et al. RobotDroid: A Lightweight Malware Detection Framework On Smartphones , 2012, J. Networks.
[120] Maria Papadaki,et al. Active authentication for mobile devices utilising behaviour profiling , 2014, International Journal of Information Security.
[121] Josef Bigün,et al. Non-intrusive liveness detection by face images , 2009, Image Vis. Comput..
[122] Sungzoon Cho,et al. Keystroke dynamics-based user authentication using long and free text strings from various input devices , 2015, Inf. Sci..
[123] Alexander H. Waibel,et al. Multimodal error correction for speech user interfaces , 2001, TCHI.
[124] Kiran S. Balagani,et al. Making impostor pass rates meaningless: A case of snoop-forge-replay attack on continuous cyber-behavioral verification with keystrokes , 2011, CVPR 2011 WORKSHOPS.
[125] Christoph Busch,et al. Authentication of Smartphone Users Based on the Way They Walk Using k-NN Algorithm , 2012, 2012 Eighth International Conference on Intelligent Information Hiding and Multimedia Signal Processing.
[126] Hamed Ketabdar,et al. MagiSign : User Identification / Authentication Based on 3 D Around Device Magnetic Signatures , 2010 .
[127] Khalid Saeed,et al. User Authentication for Mobile Devices , 2013, CISIM.
[128] Nathan L. Clarke,et al. Keystroke Analysis for Thumb-based Keyboards on Mobile Devices , 2007, SEC.
[129] Paolo Abeni,et al. Implementing Biometrics-Based Authentication for Mobile Devices , 2006 .
[130] Steven Furnell,et al. Authenticating mobile phone users using keystroke analysis , 2006, International Journal of Information Security.
[131] Christoph Busch,et al. Unobtrusive User-Authentication on Mobile Phones Using Biometric Gait Recognition , 2010, 2010 Sixth International Conference on Intelligent Information Hiding and Multimedia Signal Processing.
[132] Nguyen Minh Duc. Your face is NOT your password Face Authentication ByPassing Lenovo – Asus – Toshiba , 2009 .
[133] Tao Feng,et al. Continuous mobile authentication using a novel Graphic Touch Gesture Feature , 2013, 2013 IEEE Sixth International Conference on Biometrics: Theory, Applications and Systems (BTAS).
[134] Thang Hoang,et al. Gait identification using accelerometer on mobile phone , 2012, 2012 International Conference on Control, Automation and Information Sciences (ICCAIS).
[135] Venu Govindaraju,et al. Behavioural biometrics: a survey and classification , 2008, Int. J. Biom..
[136] Matti Pietikäinen,et al. Face and Eye Detection for Person Authentication in Mobile Phones , 2007, 2007 First ACM/IEEE International Conference on Distributed Smart Cameras.
[137] Daniele Sgandurra,et al. A Survey on Security for Mobile Devices , 2013, IEEE Communications Surveys & Tutorials.
[138] Ian Oakley,et al. Multi-touch passwords for mobile device access , 2012, UbiComp.
[139] Ting-Yi Chang,et al. Two novel biometric features in keystroke dynamics authentication systems for touch screen devices , 2014, Secur. Commun. Networks.
[140] Tao Zhang,et al. A Smartphone Malware Detection Framework Based on Artificial Immunology , 2013, J. Networks.
[141] Munaga V. N. K. Prasad,et al. Generating cancellable fingerprint templates based on Delaunay triangle feature set construction , 2016, IET Biom..
[142] Yuval Elovici,et al. Google Android: A Comprehensive Security Assessment , 2010, IEEE Security & Privacy.
[143] Anil K. Jain,et al. FVC2000: Fingerprint Verification Competition , 2002, IEEE Trans. Pattern Anal. Mach. Intell..
[144] Patrick Traynor,et al. (sp)iPhone: decoding vibrations from nearby keyboards using mobile phone accelerometers , 2011, CCS '11.
[145] Zhi Xu,et al. TapLogger: inferring user inputs on smartphone touchscreens using on-board motion sensors , 2012, WISEC '12.
[146] Ahmad-Reza Sadeghi,et al. PSiOS: bring your own privacy & security to iOS devices , 2013, ASIA CCS '13.
[147] P. Bhattarakosol,et al. Authenticating User Using Keystroke Dynamics and Finger Pressure , 2009, 2009 6th IEEE Consumer Communications and Networking Conference.
[148] Matt Wolff. Behavioral Biometric Identification on Mobile Devices , 2013, HCI.
[149] Duke Lee,et al. The State of the Touch‐Screen Panel Market in 2011 , 2011 .
[150] Tao Feng,et al. Continuous mobile authentication using touchscreen gestures , 2012, 2012 IEEE Conference on Technologies for Homeland Security (HST).
[151] Xinjian Chen,et al. A Secured Mobile Phone Based on Embedded Fingerprint Recognition Systems , 2005, ISI.
[152] Fan Zhang,et al. Stealthy video capturer: a new video-based spyware in 3G smartphones , 2009, WiSec '09.
[153] Steven Furnell,et al. Authentication of users on mobile telephones - A survey of attitudes and practices , 2005, Comput. Secur..
[154] Annie I. Antón,et al. Towards understanding user perceptions of authentication technologies , 2007, WPES '07.
[155] Michael R. Lyu,et al. Towards Continuous and Passive Authentication via Touch Biometrics: An Experimental Study on Smartphones , 2014, SOUPS.
[156] Steven Furnell,et al. Multi-modal Behavioural Biometric Authentication for Mobile Devices , 2012, SEC.
[157] Sahin Albayrak,et al. Smartphone malware evolution revisited: Android next target? , 2009, 2009 4th International Conference on Malicious and Unwanted Software (MALWARE).
[158] Chng Eng Siong,et al. Vulnerability of speaker verification systems against voice conversion spoofing attacks: The case of telephone speech , 2012, 2012 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP).
[159] Jiankun Hu,et al. Biometric Mobile Template Protection: A Composite Feature Based Fingerprint Fuzzy Vault , 2009, 2009 IEEE International Conference on Communications.
[160] Hao Chen,et al. On the Practicality of Motion Based Keystroke Inference Attack , 2012, TRUST.
[161] Yuval Elovici,et al. Intrusion detection for mobile devices using the knowledge-based, temporal abstraction method , 2010, J. Syst. Softw..
[162] Jin-Suk Kang,et al. Mobile iris recognition systems: An emerging biometric technology , 2010, ICCS.
[163] Markus Jakobsson,et al. Implicit Authentication through Learning User Behavior , 2010, ISC.
[164] Sébastien Marcel,et al. Cross-Pollination of Normalization Techniques From Speaker to Face Authentication Using Gaussian Mixture Models , 2012, IEEE Transactions on Information Forensics and Security.
[165] Apu Kapadia,et al. Soundcomber: A Stealthy and Context-Aware Sound Trojan for Smartphones , 2011, NDSS.
[166] Ibrahim Khalil,et al. Data mining in mobile ECG based biometric identification , 2014, J. Netw. Comput. Appl..
[167] Jean-Marc Robert,et al. Security and usability: the case of the user authentication methods , 2006, IHM '06.
[168] Klaus H. Hinrichs,et al. An implicit author verification system for text messages based on gesture typing biometrics , 2014, CHI.
[169] Romit Roy Choudhury,et al. Tapprints: your finger taps have fingerprints , 2012, MobiSys '12.
[170] Alan Goode. Bring your own finger – how mobile is bringing biometrics to consumers , 2014 .
[171] Yanggon Kim,et al. Pupil and Iris Localization for Iris Recognition in Mobile Phones , 2006, Seventh ACIS International Conference on Software Engineering, Artificial Intelligence, Networking, and Parallel/Distributed Computing (SNPD'06).
[172] Nalini K. Ratha,et al. Enhancing security and privacy in biometrics-based authentication systems , 2001, IBM Syst. J..
[173] Heikki Ailisto,et al. Identifying users of portable devices from gait pattern with accelerometers , 2005, Proceedings. (ICASSP '05). IEEE International Conference on Acoustics, Speech, and Signal Processing, 2005..
[174] Dawn Xiaodong Song,et al. Touchalytics: On the Applicability of Touchscreen Input as a Behavioral Biometric for Continuous Authentication , 2012, IEEE Transactions on Information Forensics and Security.
[175] Debin Gao,et al. I can be You: Questioning the use of Keystroke Dynamics as Biometrics , 2013, NDSS.
[176] Alireza Sahami Shirazi,et al. Assessing the vulnerability of magnetic gestural authentication to video-based shoulder surfing attacks , 2012, CHI.
[177] Heinrich Hußmann,et al. Touch me once and i know it's you!: implicit authentication based on touch screen patterns , 2012, CHI.
[178] Felix C. Freiling,et al. Mobile Security Catching Up? Revealing the Nuts and Bolts of the Security of Mobile Devices , 2011, 2011 IEEE Symposium on Security and Privacy.
[179] Nathan L. Clarke,et al. The application of signature recognition to transparent handwriting verification for mobile devices , 2007, Inf. Manag. Comput. Secur..
[180] Julian Fiérrez,et al. Combining Biometric Evidence for Person Authentication , 2003, Advanced Studies in Biometrics.
[181] Shangling Song,et al. An embedded real-time finger-vein recognition system for mobile devices , 2012, IEEE Transactions on Consumer Electronics.
[182] Springer-Verlag London Limited. User privacy and modern mobile services: are they on the same path? , 2013 .
[183] Nasir D. Memon,et al. Multitouch Gesture-Based Authentication , 2014, IEEE Transactions on Information Forensics and Security.
[184] Lei Zhang,et al. Palmprint Verification on Mobile Phones Using Accelerated Competitive Code , 2011, 2011 International Conference on Hand-Based Biometrics.
[185] David J. Crandall,et al. PlaceRaider: Virtual Theft in Physical Spaces with Smartphones , 2012, NDSS.
[186] Jiankun Hu,et al. Mobile device access control: an improved correlation based face authentication scheme and its Java ME application , 2012, Concurr. Comput. Pract. Exp..
[187] Jaehyun Park,et al. Touch key design for target selection on a mobile phone , 2008, Mobile HCI.
[188] Hareesh Ravi,et al. A novel method for touch-less finger print authentication , 2013, 2013 IEEE International Conference on Technologies for Homeland Security (HST).
[189] Jong-Hoon Youn,et al. Biometric gait recognition based on wireless acceleration sensor using k-nearest neighbor classification , 2014, 2014 International Conference on Computing, Networking and Communications (ICNC).
[190] Alessandro Neri,et al. User authentication using keystroke dynamics for cellular phones , 2009 .
[191] Adam Krzyzak,et al. Cell Phones Personal Authentication Systems Using Multimodal Biometrics , 2008, ICIAR.
[192] Georgios Kambourakis,et al. From keyloggers to touchloggers: Take the rough with the smooth , 2013, Comput. Secur..
[193] Herbert Reininger,et al. Continuous Speaker Verification in Realtime , 2011, BIOSIG.
[194] John Daugman,et al. High Confidence Visual Recognition of Persons by a Test of Statistical Independence , 1993, IEEE Trans. Pattern Anal. Mach. Intell..
[195] Jianying Hu,et al. User interface for a PCS smart phone , 1999, Proceedings IEEE International Conference on Multimedia Computing and Systems.
[196] Mauro Conti,et al. I Sensed It Was You: Authenticating Mobile Users with Sensor-Enhanced Keystroke Dynamics , 2014, DIMVA.
[197] Yongsheng Gao,et al. Face recognition across pose: A review , 2009, Pattern Recognit..
[198] Xiao Wang,et al. SenSec: Mobile security through passive sensing , 2013, 2013 International Conference on Computing, Networking and Communications (ICNC).
[199] J. Hu. Mobile fingerprint template protection: Progress and open issues , 2008, 2008 3rd IEEE Conference on Industrial Electronics and Applications.
[200] Georgios Kambourakis,et al. The best of both worlds: a framework for the synergistic operation of host and cloud anomaly-based IDS for smartphones , 2014, EuroSec '14.
[201] Sabah Jassim,et al. Multimodal person authentication on a smartphone under realistic conditions , 2006, SPIE Defense + Commercial Sensing.
[202] Tieniu Tan,et al. Embedded Palmprint Recognition System on Mobile Devices , 2007, ICB.
[203] Shie Mannor,et al. Activity and Gait Recognition with Time-Delay Embeddings , 2010, AAAI.
[204] Deian Stefan,et al. Robustness of keystroke-dynamics based biometrics against synthetic forgeries , 2012, Comput. Secur..
[205] Sébastien Marcel,et al. Bi-modal biometric authentication on mobile phones in challenging conditions , 2014, Image Vis. Comput..
[206] R. C. Johnson,et al. Secure voice-based authentication for mobile devices: vaulted voice verification , 2012, Defense, Security, and Sensing.
[207] Gonzalo Bailador,et al. Authentication in mobile devices through hand gesture recognition , 2012, International Journal of Information Security.
[208] Muddassar Farooq,et al. Keystroke-Based User Identification on Smart Phones , 2009, RAID.
[209] John Daugman,et al. How iris recognition works , 2002, IEEE Transactions on Circuits and Systems for Video Technology.
[210] Zhigang Liu,et al. Darwin phones: the evolution of sensing and inference on mobile phones , 2010, MobiSys '10.
[211] David Zhang,et al. A survey of palmprint recognition , 2009, Pattern Recognit..
[212] Rakesh Agrawal,et al. Keyboard acoustic emanations , 2004, IEEE Symposium on Security and Privacy, 2004. Proceedings. 2004.
[213] Sébastien Marcel,et al. Spoofing Face Recognition With 3D Masks , 2014, IEEE Transactions on Information Forensics and Security.
[214] Raymond N. J. Veldhuis,et al. Biometric Authentication System on Mobile Personal Devices , 2010, IEEE Transactions on Instrumentation and Measurement.
[215] Tom Martin,et al. Mobile phones as computing devices: the viruses are coming! , 2004, IEEE Pervasive Computing.
[216] Martin Vuagnoux,et al. Compromising Electromagnetic Emanations of Wired and Wireless Keyboards , 2009, USENIX Security Symposium.
[217] Juan E. Tapiador,et al. Evolution, Detection and Analysis of Malware for Smart Devices , 2014, IEEE Communications Surveys & Tutorials.
[218] Lauren Long. Biometrics : The Future of Mobile Phones , 2013 .
[219] Sébastien Marcel,et al. Cross-pollination of normalisation techniques from speaker to face authentication using Gaussian mixture models , 2012 .
[220] Nalini K. Ratha,et al. Generating Cancelable Fingerprint Templates , 2007, IEEE Transactions on Pattern Analysis and Machine Intelligence.
[221] Josef Bigün,et al. Verifying liveness by multiple experts in face biometrics , 2008, 2008 IEEE Computer Society Conference on Computer Vision and Pattern Recognition Workshops.
[222] Steven Furnell,et al. SMS linguistic profiling authentication on mobile device , 2011, 2011 5th International Conference on Network and System Security.
[223] Chandrasekhar Bhagavatula,et al. Usability Analysis of Biometric Authentication Systems on Mobile Phones , 2014 .
[224] Stephanie Schuckers,et al. Determination of vitality from a non-invasive biomedical measurement for use in fingerprint scanners , 2003, Pattern Recognit..
[225] Nicolae Duta,et al. A survey of biometric technology based on hand shape , 2009, Pattern Recognit..
[226] David Lazer,et al. Inferring friendship network structure by using mobile phone data , 2009, Proceedings of the National Academy of Sciences.