Kadena et al., 2022 - Google Patents
Behavioral Biometrics for more (dis) trust and securityKadena et al., 2022
- Document ID
- 6562929394441856738
- Author
- Kadena E
- Salvador L
- Rajnai Z
- Publication year
- Publication venue
- 2022 IEEE 16th International Symposium on Applied Computational Intelligence and Informatics (SACI)
External Links
Snippet
Nowadays, the identity of individuals has expanded to the cyber world. Users' virtual identity is exposed to different applications evolving quickly, and interactions with various social networking sites have become essential in our daily lives. Behavioral biometrics have …
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/32—User authentication using biometric data, e.g. fingerprints, iris scans or voiceprints
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/34—User authentication involving the use of external additional devices, e.g. dongles or smart cards
- G06F21/35—User authentication involving the use of external additional devices, e.g. dongles or smart cards communicating wirelessly
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/316—User authentication by observing the pattern of computer usage, e.g. typical user behaviour
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/36—User authentication by graphic or iconic representation
Similar Documents
| Publication | Publication Date | Title |
|---|---|---|
| Ryu et al. | Continuous multimodal biometric authentication schemes: a systematic review | |
| Dahia et al. | Continuous authentication using biometrics: An advanced review | |
| Meng et al. | Surveying the development of biometric user authentication on mobile phones | |
| Alzubaidi et al. | Authentication of smartphone users using behavioral biometrics | |
| Thomas et al. | A broad review on non-intrusive active user authentication in biometrics | |
| Neal et al. | Surveying biometric authentication for mobile device security | |
| Sultana et al. | A concept of social behavioral biometrics: motivation, current developments, and future trends | |
| Zou et al. | BiLock: User authentication via dental occlusion biometrics | |
| Ayeswarya et al. | A survey on different continuous authentication systems | |
| Amin et al. | Biometric and traditional mobile authentication techniques: Overviews and open issues | |
| Kadena et al. | Behavioral Biometrics for more (dis) trust and security | |
| Koong et al. | A user authentication scheme using physiological and behavioral biometrics for multitouch devices | |
| Ayeswarya et al. | A comprehensive review on secure biometric-based continuous authentication and user profiling | |
| Cheng et al. | Identification with your mind: A hybrid BCI-based authentication approach for anti-shoulder-surfing attacks using EEG and eye movement data | |
| Wu et al. | CaiAuth: Context-aware implicit authentication when the screen is awake | |
| Sharma et al. | Behavioral Biometrics: Past, Present | |
| Li et al. | VibHead: An authentication scheme for smart headsets through vibration | |
| Wang et al. | Exploring the hand and finger-issued behaviors toward natural authentication | |
| Oduri | Continuous authentication and behavioral biometrics: Enhancing cybersecurity in the digital era | |
| Ding et al. | Leakage or identification: Behavior-irrelevant user identification leveraging leakage current on laptops | |
| Gattulli et al. | Touch events and human activities for continuous authentication via smartphone | |
| Smith-Creasey | Biometrics for Continuous Authentication | |
| Zhao et al. | AttAuth: an implicit authentication framework for smartphone users using multimodality data | |
| Abdulkader et al. | Authentication systems: Principles and threats | |
| Dasgupta et al. | Biometric Authentication: Authentication through human characteristics |