[go: up one dir, main page]

Kadena et al., 2022 - Google Patents

Behavioral Biometrics for more (dis) trust and security

Kadena et al., 2022

Document ID
6562929394441856738
Author
Kadena E
Salvador L
Rajnai Z
Publication year
Publication venue
2022 IEEE 16th International Symposium on Applied Computational Intelligence and Informatics (SACI)

External Links

Snippet

Nowadays, the identity of individuals has expanded to the cyber world. Users' virtual identity is exposed to different applications evolving quickly, and interactions with various social networking sites have become essential in our daily lives. Behavioral biometrics have …
Continue reading at ieeexplore.ieee.org (other versions)

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/32User authentication using biometric data, e.g. fingerprints, iris scans or voiceprints
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/34User authentication involving the use of external additional devices, e.g. dongles or smart cards
    • G06F21/35User authentication involving the use of external additional devices, e.g. dongles or smart cards communicating wirelessly
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/316User authentication by observing the pattern of computer usage, e.g. typical user behaviour
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/36User authentication by graphic or iconic representation

Similar Documents

Publication Publication Date Title
Ryu et al. Continuous multimodal biometric authentication schemes: a systematic review
Dahia et al. Continuous authentication using biometrics: An advanced review
Meng et al. Surveying the development of biometric user authentication on mobile phones
Alzubaidi et al. Authentication of smartphone users using behavioral biometrics
Thomas et al. A broad review on non-intrusive active user authentication in biometrics
Neal et al. Surveying biometric authentication for mobile device security
Sultana et al. A concept of social behavioral biometrics: motivation, current developments, and future trends
Zou et al. BiLock: User authentication via dental occlusion biometrics
Ayeswarya et al. A survey on different continuous authentication systems
Amin et al. Biometric and traditional mobile authentication techniques: Overviews and open issues
Kadena et al. Behavioral Biometrics for more (dis) trust and security
Koong et al. A user authentication scheme using physiological and behavioral biometrics for multitouch devices
Ayeswarya et al. A comprehensive review on secure biometric-based continuous authentication and user profiling
Cheng et al. Identification with your mind: A hybrid BCI-based authentication approach for anti-shoulder-surfing attacks using EEG and eye movement data
Wu et al. CaiAuth: Context-aware implicit authentication when the screen is awake
Sharma et al. Behavioral Biometrics: Past, Present
Li et al. VibHead: An authentication scheme for smart headsets through vibration
Wang et al. Exploring the hand and finger-issued behaviors toward natural authentication
Oduri Continuous authentication and behavioral biometrics: Enhancing cybersecurity in the digital era
Ding et al. Leakage or identification: Behavior-irrelevant user identification leveraging leakage current on laptops
Gattulli et al. Touch events and human activities for continuous authentication via smartphone
Smith-Creasey Biometrics for Continuous Authentication
Zhao et al. AttAuth: an implicit authentication framework for smartphone users using multimodality data
Abdulkader et al. Authentication systems: Principles and threats
Dasgupta et al. Biometric Authentication: Authentication through human characteristics