2019
DOI: 10.1145/3351243
|View full text |Cite
|
Sign up to set email alerts
|

Cormorant

Abstract: People own and carry an increasing number of ubiquitous mobile devices, such as smartphones, tablets, and notebooks. Being small and mobile, those devices have a high propensity to become lost or stolen. Since mobile devices provide access to their owners' digital lives, strong authentication is vital to protect sensitive information and services against unauthorized access. However, at least one in three devices is unprotected, with inconvenience of traditional authentication being the paramount reason. We pr… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
2
0

Year Published

2019
2019
2024
2024

Publication Types

Select...
4
2

Relationship

0
6

Authors

Journals

citations
Cited by 15 publications
(4 citation statements)
references
References 51 publications
0
2
0
Order By: Relevance
“…"progressive authentication" [47], "risk-based authentication" [56] and "risk-aware authentication" [20] are used in the literature appropriately to express the adaptation capability. Publications contributing to CM4AA need to use at least one of these terms.…”
Section: Logical Search Clausementioning
confidence: 99%
See 1 more Smart Citation
“…"progressive authentication" [47], "risk-based authentication" [56] and "risk-aware authentication" [20] are used in the literature appropriately to express the adaptation capability. Publications contributing to CM4AA need to use at least one of these terms.…”
Section: Logical Search Clausementioning
confidence: 99%
“…The keywords biometrics (25) (palmprint ( 16)), behaviour (17) and patterns (17) show the trend of using these features (20) for adaptive authentication [34,35]. Databases (12) from which the information can be extracted (13) seem to be important.…”
Section: Main Abstractmentioning
confidence: 99%
“…Progressive Auth [1] was designed to secure mobile applications by using information collected from multiple devices to determine the level of confidence in the identity of the user. CORMORANT [24] is similar to Progressive Auth, but it offers more complex features. It dynamically determines the available behavioral biometrics and trusted devices.…”
Section: Related Work a Risk-based Authentication Systemsmentioning
confidence: 99%
“…However, risk-based authentication systems proposed in the literature face applicability problems. Indeed, some works do not take into consideration the sensitivity of the protected service or asset which directly informs on the potential risk occurring [3], [24]. Other works rely on static components like reauthentication methods or methods based on static contextual values [8], [18], [28].…”
Section: Introductionmentioning
confidence: 99%