A Comparative Evaluation of Implicit Authentication Schemes
暂无分享,去创建一个
[1] Markus Jakobsson,et al. Implicit Authentication through Learning User Behavior , 2010, ISC.
[2] Chih-Jen Lin,et al. LIBSVM: A library for support vector machines , 2011, TIST.
[3] Alex X. Liu,et al. Secure unlocking of mobile touch screen devices by simple gestures: you can see it but you can not do it , 2013, MobiCom.
[4] Shie Mannor,et al. Activity and Gait Recognition with Time-Delay Embeddings , 2010, AAAI.
[5] Donald J. Berndt,et al. Using Dynamic Time Warping to Find Patterns in Time Series , 1994, KDD Workshop.
[6] Nir Friedman,et al. Bayesian Network Classifiers , 1997, Machine Learning.
[7] Karin Strauss,et al. Goldilocks and the two mobile devices: going beyond all-or-nothing access to a device's applications , 2012, SOUPS.
[8] Yiming Yang,et al. Introducing the Enron Corpus , 2004, CEAS.
[9] Tao Chen,et al. Creating a live, public short message service corpus: the NUS SMS corpus , 2011, Lang. Resour. Evaluation.
[10] Eyal de Lara,et al. Ensemble: cooperative proximity-based authentication , 2010, MobiSys '10.
[11] René Mayrhofer,et al. An Analysis of Different Approaches to Gait Recognition Using Cell Phone Based Accelerometers , 2013, MoMM '13.
[12] Adrian Perrig,et al. Mobile user location-specific encryption (MULE): using your office as your password , 2010, WiSec '10.
[13] Tao Feng,et al. Continuous mobile authentication using touchscreen gestures , 2012, 2012 IEEE Conference on Technologies for Homeland Security (HST).
[14] Urs Hengartner,et al. Towards application-centric implicit authentication on smartphones , 2014, HotMobile.
[15] Guoliang Xue,et al. Near field authentication for smart devices , 2013, 2013 Proceedings IEEE INFOCOM.
[16] Vir V. Phoha,et al. Examining a Large Keystroke Biometrics Dataset for Statistical-Attack Openings , 2013, TSEC.
[17] Sunil Arya,et al. An optimal algorithm for approximate nearest neighbor searching fixed dimensions , 1998, JACM.
[18] Kirsi Helkala,et al. Biometric Gait Authentication Using Accelerometer Sensor , 2006, J. Comput..
[19] Vir V. Phoha,et al. When kids' toys breach mobile phone security , 2013, CCS.
[20] N. Asokan,et al. Drone to the Rescue: Relay-Resilient Authentication using Ambient Multi-sensing , 2014, Financial Cryptography.
[21] Alessandro Neri,et al. Keystroke dynamics authentication for mobile phones , 2011, SAC.
[22] Arun Ross,et al. An introduction to biometric recognition , 2004, IEEE Transactions on Circuits and Systems for Video Technology.
[23] Steven Furnell,et al. Flexible and Transparent User Authentication for Mobile Devices , 2009, SEC.
[24] Heng Tao Shen,et al. Principal Component Analysis , 2009, Encyclopedia of Biometrics.
[25] Tao Feng,et al. TIPS: context-aware implicit user identification using touch screen in uncontrolled environments , 2014, HotMobile.
[26] Heikki Ailisto,et al. Identifying users of portable devices from gait pattern with accelerometers , 2005, Proceedings. (ICASSP '05). IEEE International Conference on Acoustics, Speech, and Signal Processing, 2005..
[27] Dawn Xiaodong Song,et al. Touchalytics: On the Applicability of Touchscreen Input as a Behavioral Biometric for Continuous Authentication , 2012, IEEE Transactions on Information Forensics and Security.
[28] Debin Gao,et al. I can be You: Questioning the use of Keystroke Dynamics as Biometrics , 2013, NDSS.
[29] Tim Storer,et al. A framework for continuous, transparent mobile device authentication , 2013, Comput. Secur..
[30] Heinrich Hußmann,et al. Touch me once and i know it's you!: implicit authentication based on touch screen patterns , 2012, CHI.
[31] Tao Feng,et al. Continuous Mobile Authentication Using Virtual Key Typing Biometrics , 2013, 2013 12th IEEE International Conference on Trust, Security and Privacy in Computing and Communications.
[32] Christian Poellabauer,et al. Lessons learned from the netsense smartphone study , 2013, HotPlanet '13.
[33] Tao Feng,et al. Continuous mobile authentication using a novel Graphic Touch Gesture Feature , 2013, 2013 IEEE Sixth International Conference on Biometrics: Theory, Applications and Systems (BTAS).
[34] Steven Furnell,et al. Authenticating mobile phone users using keystroke analysis , 2006, International Journal of Information Security.
[35] Chuan Qin,et al. Progressive Authentication: Deciding When to Authenticate on Mobile Phones , 2012, USENIX Security Symposium.
[36] Xiang-Yang Li,et al. SilentSense: silent user identification via touch and movement behavioral biometrics , 2013, MobiCom.
[37] Vir V. Phoha,et al. Which verifiers work?: A benchmark evaluation of touch-based authentication algorithms , 2013, 2013 IEEE Sixth International Conference on Biometrics: Theory, Applications and Systems (BTAS).