WiLock: Exploiting Wireless Signals for Device-Free Continuous Authentication
暂无分享,去创建一个
Xiaohui Liang | Haoyu Wang | Mohammad Hadian | Thamer Altuwaiyan | Xiaohui Liang | Haoyu Wang | M. Hadian | Thamer Altuwaiyan
[1] Ryan J. Halter,et al. A wearable system that knows who wears it , 2014, MobiSys.
[2] Rong Li,et al. Privacy Leakage in Mobile Sensing: Your Unlock Passwords Can Be Leaked through Wireless Hotspot Functionality , 2016, Mob. Inf. Syst..
[3] Wei Wang,et al. Understanding and Modeling of WiFi Signal Based Human Activity Recognition , 2015, MobiCom.
[4] Ivan Martinovic,et al. Using Reflexive Eye Movements for Fast Challenge-Response Authentication , 2016, CCS.
[5] Aggelos K. Katsaggelos,et al. Audio-Visual Biometrics , 2006, Proceedings of the IEEE.
[6] N. Asokan,et al. Pitfalls in Designing Zero-Effort Deauthentication: Opportunistic Human Observation Attacks , 2015, NDSS.
[7] Jie Yang,et al. E-eyes: device-free location-oriented activity identification using fine-grained WiFi signatures , 2014, MobiCom.
[8] Sean W. Smith,et al. Healthcare information technology's relativity problems: a typology of how patients' physical reality, clinicians' mental models, and healthcare information technology differ , 2014, J. Am. Medical Informatics Assoc..
[9] Kaishun Wu,et al. We Can Hear You with Wi-Fi! , 2016, IEEE Trans. Mob. Comput..
[10] Mauro Roisenberg,et al. Continuous Authentication by Keystroke Dynamics Using Committee Machines , 2006, ISI.
[11] Brian D. Noble,et al. Protecting applications with transient authentication , 2003, MobiSys '03.
[12] Wei Wang,et al. Keystroke Recognition Using WiFi Signals , 2015, MobiCom.
[13] Ivan Martinovic,et al. Preventing Lunchtime Attacks: Fighting Insider Threats With Eye Movement Biometrics , 2015, NDSS.
[14] David Kotz,et al. ZEBRA: Zero-Effort Bilateral Recurring Authentication , 2014, IEEE Symposium on Security and Privacy.
[15] Gene Tsudik,et al. Authentication using pulse-response biometrics , 2017, NDSS.
[16] Sean W. Smith,et al. Preventative Directions For Insider Threat Mitigation Via Access Control , 2008, Insider Attack and Cyber Security.