2009
DOI: 10.1007/978-3-642-01516-8_11
|View full text |Cite
|
Sign up to set email alerts
|

Inferring Identity Using Accelerometers in Television Remote Controls

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4
1

Citation Types

0
23
0
2

Year Published

2010
2010
2015
2015

Publication Types

Select...
4
2
1

Relationship

0
7

Authors

Journals

citations
Cited by 27 publications
(25 citation statements)
references
References 5 publications
0
23
0
2
Order By: Relevance
“…Implicit authentication systems have been proposed based on many different features. These include systems that authenticate the user based on biometrics [36,40,42,50], accelerometers [11], gait recognition [33,23,20], call and SMS pattern [51], location pattern [10,52,9,12,53], keystroke dynamics [14,28,60,38,19,58], proximity to other devices [32,48], and touchscreen dynamics [57,16,21]. Industry products such as Sentry from AdmitOne Security 2 and BehavioMobile from BehavioSec 3 implement implicit authentication.…”
Section: Related Workmentioning
confidence: 99%
“…Implicit authentication systems have been proposed based on many different features. These include systems that authenticate the user based on biometrics [36,40,42,50], accelerometers [11], gait recognition [33,23,20], call and SMS pattern [51], location pattern [10,52,9,12,53], keystroke dynamics [14,28,60,38,19,58], proximity to other devices [32,48], and touchscreen dynamics [57,16,21]. Industry products such as Sentry from AdmitOne Security 2 and BehavioMobile from BehavioSec 3 implement implicit authentication.…”
Section: Related Workmentioning
confidence: 99%
“…Decision trees are popular for their simplicity of use, interpretability, and good runtime performance. Decision trees are popular in applications to recognize: identity / ability (e.g., [8]), interruptibility (e.g., [2,42]), mobility (e.g., [45]), etc.…”
Section: Rulesmentioning
confidence: 99%
“…on privacy-preserving biometric systems [22,24,25,29] and implicit authentication systems using accelerometers [9], gait recognition [20], user location [8,30,10,7], and fingerprints [34] can be found in Appendix A.…”
Section: Related Workmentioning
confidence: 99%