2014
DOI: 10.1186/2196-064x-1-7
|View full text |Cite
|
Sign up to set email alerts
|

Understanding user perceptions of transparent authentication on a mobile device

Abstract: Due to the frequency with which smartphone owners use their devices, effortful authentication methods such as passwords and PINs are not an effective choice for smartphone authentication. Past research has offered solutions such as graphical passwords, biometrics and password hardening techniques. However, these solutions still require the user to authenticate frequently, which may become increasingly frustrating over time. Transparent authentication has been suggested as an alternative to such effortful solut… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

1
33
1

Year Published

2018
2018
2021
2021

Publication Types

Select...
5
1

Relationship

0
6

Authors

Journals

citations
Cited by 54 publications
(36 citation statements)
references
References 38 publications
1
33
1
Order By: Relevance
“…However, continuous authentication, active authentication, implicit authentication, and transparent authentication have been interchangeably used in many papers [10,120,131,132]. Patel et al [5] considered continuous authentication and active authentication systems as similar and explained it as continuous monitoring of the user activities after the initial access to the mobile device.…”
Section: Evaluation Enrollment Presentationmentioning
confidence: 99%
See 4 more Smart Citations
“…However, continuous authentication, active authentication, implicit authentication, and transparent authentication have been interchangeably used in many papers [10,120,131,132]. Patel et al [5] considered continuous authentication and active authentication systems as similar and explained it as continuous monitoring of the user activities after the initial access to the mobile device.…”
Section: Evaluation Enrollment Presentationmentioning
confidence: 99%
“…is concept stresses more on the procedure of collecting and analyzing user authentication identifiers [4,10]. More specifically, if the system performs authentication steps in background (without requiring explicitly user cooperation) [10,31], they are termed as implicit, transparent, or unobtrusive authentication systems.…”
Section: Transparent Authenticationmentioning
confidence: 99%
See 3 more Smart Citations