2016 14th Annual Conference on Privacy, Security and Trust (PST) 2016
DOI: 10.1109/pst.2016.7906979
|View full text |Cite
|
Sign up to set email alerts
|

User behaviour and interactions for multimodal authentication

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1

Citation Types

0
2
0
1

Year Published

2019
2019
2022
2022

Publication Types

Select...
2
2

Relationship

0
4

Authors

Journals

citations
Cited by 4 publications
(3 citation statements)
references
References 1 publication
0
2
0
1
Order By: Relevance
“…However, despite the significant advantage of Behaviometrics authentication, a key challenge is determining the appropriate combination of behavioral biometrics to achieve an adequate level of security and higher user experience. The study conducted by Haron et al [47] presented an extensive discussion on the user behavior for multimodal authentication systems for web application access and login. The authors have highlighted the efficiency of a multimodal authentication scheme considering high-level user experience in this study.…”
Section: ) Behaviometrics Authenticationmentioning
confidence: 99%
See 1 more Smart Citation
“…However, despite the significant advantage of Behaviometrics authentication, a key challenge is determining the appropriate combination of behavioral biometrics to achieve an adequate level of security and higher user experience. The study conducted by Haron et al [47] presented an extensive discussion on the user behavior for multimodal authentication systems for web application access and login. The authors have highlighted the efficiency of a multimodal authentication scheme considering high-level user experience in this study.…”
Section: ) Behaviometrics Authenticationmentioning
confidence: 99%
“…However, traditional authentication approaches are associated with limitations. They do not ask the user to validate their uniqueness during their active login session, making computing devices vulnerable to invite security threats and illegal activity when users log in [11]. These studies have also emphasized improving privacy when sensitive context information is accessed, which is a significant challenge.…”
Section: Introductionmentioning
confidence: 99%
“…Pemanfaatan lapisan tamabahan untuk keamanan menjadi perhatian penting untuk perencanaan dan pengembangan sistem kedepannya. Tingkat keamanan dan metode autentikasi yang dapat digunakan oleh pengguna dianalisa oleh penelitian yang dilakukan [12]. Penelitian tersebut memberikan preferensi kepada pengguna untuk bebas menggunakan metode autentikasi yang diinginkan, sesuai dengan tingkat pemahaman terhadap IT.…”
Section: Tinjauan Pustakaunclassified