Rethinking Authentication on Smart Mobile Devices

被引:5
|
作者
Wang, Ding [1 ]
Shen, Jian [2 ]
Liu, Joseph K. [3 ]
Choo, Kim-Kwang Raymond [4 ]
机构
[1] Peking Univ, Sch Elect Engn & Comp Sci, Beijing 100871, Peoples R China
[2] Nanjing Univ Informat Sci & Technol, Sch Comp & Software, Nanjing, Jiangsu, Peoples R China
[3] Monash Univ, Fac Informat Technol, Melbourne, Vic, Australia
[4] Univ Texas San Antonio, Dept Informat Syst & Cyber Secur, San Antonio, TX 78249 USA
关键词
All Open Access; Gold;
D O I
10.1155/2018/7079037
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
引用
下载
收藏
页数:4
相关论文
共 50 条
  • [31] Biometric Authentication System on Mobile Personal Devices
    Tao, Qian
    Veldhuis, Raymond
    IEEE TRANSACTIONS ON INSTRUMENTATION AND MEASUREMENT, 2010, 59 (04) : 763 - 773
  • [32] Authentication of users of mobile devices by their motor reactions
    Nechiporenko A.S.
    Gubarenko E.V.
    Gubarenko M.S.
    Telecommunications and Radio Engineering (English translation of Elektrosvyaz and Radiotekhnika), 2019, 78 (12): : 987 - 1003
  • [33] Proximity-based authentication of mobile devices
    Scannell, Adin
    Varshavsky, Alexander
    LaMarca, Anthony
    de Lara, Eyal
    International Journal of Security and Networks, 2009, 4 (1-2) : 4 - 16
  • [34] Ensuring Secured Iris Authentication for Mobile Devices
    Choudhary, Meenakshi
    Tiwari, Vivek
    Venkanna, U.
    2021 IEEE INTERNATIONAL CONFERENCE ON CONSUMER ELECTRONICS (ICCE), 2021,
  • [35] Who wants Continuous Authentication on Mobile Devices?
    Rasnayaka, Sanka
    Sim, Terence
    2018 IEEE 9TH INTERNATIONAL CONFERENCE ON BIOMETRICS THEORY, APPLICATIONS AND SYSTEMS (BTAS), 2018,
  • [36] A Flick Biometric Authentication Mechanism on Mobile Devices
    Shih, Dong-Her
    Lu, Chia-Ming
    Shih, Ming-Hung
    2015 INTERNATIONAL CONFERENCE ON INFORMATIVE AND CYBERNETICS FOR COMPUTATIONAL SOCIAL SYSTEMS (ICCSS), 2015, : 31 - 33
  • [37] Flexible and Transparent User Authentication for Mobile Devices
    Clarke, Nathan
    Karatzouni, Sevasti
    Furnell, Steven
    EMERGING CHALLENGES FOR SECURITY, PRIVACY AND TRUST: 24TH IFIP TC 11 INTERNATIONAL INFORMATION SECURITY CONFERENCE, SEC 2009, PROCEEDINGS, 2009, 297 : 1 - 12
  • [38] Comprehensive analysis of continuous authentication for mobile devices
    Dagar, Aishani
    Singh, Karan
    Khan, Tayyab
    JOURNAL OF DISCRETE MATHEMATICAL SCIENCES & CRYPTOGRAPHY, 2023, 26 (07): : 2007 - 2024
  • [39] Behaviour Profiling for Transparent Authentication for Mobile Devices
    Li, Fudong
    Clarke, Nathan
    Papadaki, Maria
    Dowland, Paul
    PROCEEDINGS OF THE 10TH EUROPEAN CONFERENCE ON INFORMATION WARFARE AND SECURITY, 2011, : 307 - 314
  • [40] Efficiency of Paid Authentication Methods for Mobile Devices
    Jeong Yeon Kim
    Wireless Personal Communications, 2017, 93 : 543 - 551