Demo: A Multimodal Behavioral Biometric Scheme for Smartphone User Authentication (MBBS)
Abstract
References
Index Terms
- Demo: A Multimodal Behavioral Biometric Scheme for Smartphone User Authentication (MBBS)
Recommendations
Behavior Fingerprints Based Smartphone User Authentication: A Review
Green, Pervasive, and Cloud ComputingAbstractNowadays, humans have become too dependent on their smartphone devices for a broad range of tasks: shopping, bank interactions, socialization …etc. Wide-speared dependence on smartphone devices raises numerous security and privacy risks. To deal ...
A Behavioral Biometric Authentication Framework on Smartphones
ASIA CCS '17: Proceedings of the 2017 ACM on Asia Conference on Computer and Communications SecurityTo protect smartphones from unauthorized access, the user has the option to activate authentication mechanisms : PIN, Password, or Pattern. Unfortunately, these mechanisms are vulnerable to shoulder-surfing, smudge and snooping attacks. Even the ...
DIALERAUTH: A Motion-assisted Touch-based Smartphone User Authentication Scheme
CODASPY '18: Proceedings of the Eighth ACM Conference on Data and Application Security and PrivacyThis paper introduces DIALERAUTH - a mechanism which leverages the way a smartphone user taps/enters any text-independent 10-digit number (replicating the dialing process) and the hand's micro-movements she makes while doing so. DIALERAUTH authenticates ...
Comments
Information & Contributors
Information
Published In
- General Chair:
- Silvio Ranise,
- Program Chairs:
- Roberto Carbone,
- Daniel Takabi
Sponsors
Publisher
Association for Computing Machinery
New York, NY, United States
Publication History
Check for updates
Author Tags
Qualifiers
- Short-paper
Conference
Acceptance Rates
Contributors
Other Metrics
Bibliometrics & Citations
Bibliometrics
Article Metrics
- 0Total Citations
- 96Total Downloads
- Downloads (Last 12 months)31
- Downloads (Last 6 weeks)4
Other Metrics
Citations
View Options
Login options
Check if you have access through your login credentials or your institution to get full access on this article.
Sign in