2011
DOI: 10.1007/978-3-642-18178-8_9
|View full text |Cite
|
Sign up to set email alerts
|

Implicit Authentication through Learning User Behavior

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
147
0
2

Year Published

2011
2011
2019
2019

Publication Types

Select...
5
3
1

Relationship

0
9

Authors

Journals

citations
Cited by 179 publications
(155 citation statements)
references
References 15 publications
0
147
0
2
Order By: Relevance
“…Keystroke dynamics for authenticating mobile phone users have also been widely studied [15,17,21,36,39]. A body of work has also been conducted on Unobtrusive methods for IA on mobile phones such as Gait-based IA schemes [11,35] and context aware schemes [5,16,33]. Our work differs significantly from the above mentioned schemes based on the reasons given in Section 5.…”
Section: Related Workmentioning
confidence: 99%
“…Keystroke dynamics for authenticating mobile phone users have also been widely studied [15,17,21,36,39]. A body of work has also been conducted on Unobtrusive methods for IA on mobile phones such as Gait-based IA schemes [11,35] and context aware schemes [5,16,33]. Our work differs significantly from the above mentioned schemes based on the reasons given in Section 5.…”
Section: Related Workmentioning
confidence: 99%
“…As they become an increasingly indispensable and important part of our everyday life, it is essential to ensure secure access of these devices as they store not only personal but oftentimes sensitive and even critical information [24,86,93]. Driven by this increasing demand, research work on keystroke dynamics biometrics on mobile devices has mushroomed in recent years [22,42].…”
Section: Keystroke Dynamics For Mobile Devicesmentioning
confidence: 99%
“…are all rich information that could be gathered and recorded almost entirely using smartphones. (Shi et al, 2011).…”
Section: Motivation and Proposalmentioning
confidence: 99%
“…According to Shi et al (2011) the implicit authentication is able to: i) act as a second factor for authentication passwords and supplements for greater assurance of a profitable and easy to use, ii) work as the primary authentication method to completely replace passwords, and iii) provide additional security for financial transactions such as credit card purchases, acting as an indicator of fraud. We note that in the latter scenario, the act of making the transaction does not require any user action on the device.…”
Section: Motivation and Proposalmentioning
confidence: 99%