Proceedings of the 2016 ACM International Joint Conference on Pervasive and Ubiquitous Computing: Adjunct 2016
DOI: 10.1145/2968219.2971448
|View full text |Cite
|
Sign up to set email alerts
|

Location-based risk assessment for mobile authentication

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
7
0

Year Published

2018
2018
2023
2023

Publication Types

Select...
5
4
1

Relationship

1
9

Authors

Journals

citations
Cited by 15 publications
(7 citation statements)
references
References 12 publications
0
7
0
Order By: Relevance
“…Attempts to strengthen password-based authentication using riskbased metrics (such as behavioural biometrics, device fingerprinting, session context, time of access among others) have been discussed amply in the literature, see for instance [4; 5; 9; 23; 25]. In particular, several proposals use a given user's location as a risk factor, which is a natural feature that profiles several users in common circumstances [15].…”
Section: Related Workmentioning
confidence: 99%
“…Attempts to strengthen password-based authentication using riskbased metrics (such as behavioural biometrics, device fingerprinting, session context, time of access among others) have been discussed amply in the literature, see for instance [4; 5; 9; 23; 25]. In particular, several proposals use a given user's location as a risk factor, which is a natural feature that profiles several users in common circumstances [15].…”
Section: Related Workmentioning
confidence: 99%
“…To avoid password challenges, Stajano [51] introduced Pico which unlocks a device in the presence of k-out-of-n small encrypted hardware tokens called Picosiblings. A preliminary architecture for a cross-device authentication system utilizing multiple biometrics as well as risk has been proposed in [20] and later expanded in [21,24,25]. A system for behavior-based, transparent multi-factor authentication has been patented by Gordon et al [14].…”
Section: Related Workmentioning
confidence: 99%
“…While re-active risk-based authentication accepts some of the risks until the risk score goes beyond the acceptable threshold level, and consequently, reauthentication is required. In [18], Hintze et al evaluate the risk and make authentication decision for mobile devices based on user´s geographical location and multi-modal biometrics. On the other hand, in [19], Hurkala et al proposed a context risk aware authentication to evaluate the risk associated to the user identity.…”
Section: Risk-based User Authenticationmentioning
confidence: 99%