Enhancing touch behavioral authentication via cost-based intelligent mechanism on smartphones
Published 2018 View Full Article
- Home
- Publications
- Publication Search
- Publication Details
Title
Enhancing touch behavioral authentication via cost-based intelligent mechanism on smartphones
Authors
Keywords
Behavioral biometrics, Touch dynamics, User authentication, Smartphone usability, Intelligent mechanism, Machine learning
Journal
MULTIMEDIA TOOLS AND APPLICATIONS
Volume -, Issue -, Pages -
Publisher
Springer Nature
Online
2018-05-20
DOI
10.1007/s11042-018-6094-2
References
Ask authors/readers for more resources
Related references
Note: Only part of the references are listed.- Secure attribute-based data sharing for resource-limited users in cloud computing
- (2018) Jin Li et al. COMPUTERS & SECURITY
- A technique to circumvent SSL/TLS validations on iOS devices
- (2017) Christian J. D’Orazio et al. Future Generation Computer Systems-The International Journal of eScience
- Location-Sharing Systems With Enhanced Privacy in Mobile Online Social Networks
- (2017) Jin Li et al. IEEE Systems Journal
- Behavior Based Human Authentication on Touch Screen Devices Using Gestures and Signatures
- (2017) Muhammad Shahzad et al. IEEE TRANSACTIONS ON MOBILE COMPUTING
- Pervasive social networking forensics: Intelligence and evidence from mobile device extracts
- (2017) Darren Quick et al. JOURNAL OF NETWORK AND COMPUTER APPLICATIONS
- Data Exfiltration From Internet of Things Devices: iOS Devices as Case Studies
- (2017) Christian J. D'Orazio et al. IEEE Internet of Things Journal
- An adversary model to evaluate DRM protection of video contents on iOS devices
- (2016) Christian D'Orazio et al. COMPUTERS & SECURITY
- Forensic data acquisition from cloud-of-things devices: windows Smartphones as a case study
- (2016) Niken Dwi Wahyu Cahyani et al. CONCURRENCY AND COMPUTATION-PRACTICE & EXPERIENCE
- Surveying the Development of Biometric User Authentication on Mobile Phones
- (2015) Weizhi Meng et al. IEEE Communications Surveys and Tutorials
- Identity-Based Encryption with Outsourced Revocation in Cloud Computing
- (2015) Jin Li et al. IEEE TRANSACTIONS ON COMPUTERS
- L-EncDB: A lightweight framework for privacy-preserving data queries in cloud computing
- (2015) Jin Li et al. KNOWLEDGE-BASED SYSTEMS
- Mobile User Authentication Using Statistical Touch Dynamics Images
- (2014) Xi Zhao et al. IEEE Transactions on Information Forensics and Security
- Multitouch Gesture-Based Authentication
- (2014) Napa Sae-Bae et al. IEEE Transactions on Information Forensics and Security
- Cross-Pollination of Normalization Techniques From Speaker to Face Authentication Using Gaussian Mixture Models
- (2012) Roy Wallace et al. IEEE Transactions on Information Forensics and Security
- Touchalytics: On the Applicability of Touchscreen Input as a Behavioral Biometric for Continuous Authentication
- (2012) Mario Frank et al. IEEE Transactions on Information Forensics and Security
- Google Android: A Comprehensive Security Assessment
- (2010) A. Shabtai et al. IEEE SECURITY & PRIVACY
- Multifeature-Based High-Resolution Palmprint Recognition
- (2010) Jifeng Dai et al. IEEE TRANSACTIONS ON PATTERN ANALYSIS AND MACHINE INTELLIGENCE
- Usability evaluation of voiceprint authentication in automated telephone banking: Sentences versus digits
- (2010) Nancie Gunson et al. INTERACTING WITH COMPUTERS
- Multi-touch user interface evaluation for 3D object manipulation on mobile devices
- (2009) Donato Fiorella et al. Journal on Multimodal User Interfaces
Discover Peeref hubs
Discuss science. Find collaborators. Network.
Join a conversationFind the ideal target journal for your manuscript
Explore over 38,000 international journals covering a vast array of academic fields.
Search