4.2 Article

PassContext and PassActions: transforming authentication into multi-dimensional contextual and interaction sequences

Related references

Note: Only part of the references are listed.
Article Computer Science, Artificial Intelligence

Advanced lightweight multi-factor remote user authentication scheme for cloud-IoT applications

Geeta Sharma et al.

JOURNAL OF AMBIENT INTELLIGENCE AND HUMANIZED COMPUTING (2020)

Article Computer Science, Artificial Intelligence

Provably secure anonymous three-factor authentication scheme for multi-server environments

Dongqing Xu et al.

JOURNAL OF AMBIENT INTELLIGENCE AND HUMANIZED COMPUTING (2019)

Article Computer Science, Artificial Intelligence

BraillePassword: accessible web authentication technique on touchscreen devices

Mrim Alnfiai et al.

JOURNAL OF AMBIENT INTELLIGENCE AND HUMANIZED COMPUTING (2019)

Article Computer Science, Artificial Intelligence

A continuous smartphone authentication method based on gait patterns and keystroke dynamics

Imane Lamiche et al.

JOURNAL OF AMBIENT INTELLIGENCE AND HUMANIZED COMPUTING (2019)

Review Computer Science, Hardware & Architecture

Finger knuckle biometrics - A review

K. Usha et al.

COMPUTERS & ELECTRICAL ENGINEERING (2015)

Article Computer Science, Hardware & Architecture

Multi-modal decision fusion for continuous authentication

Lex Fridman et al.

COMPUTERS & ELECTRICAL ENGINEERING (2015)

Article Computer Science, Hardware & Architecture

A novel and provably secure biometrics-based three-factor remote authentication scheme for mobile client-server networks

Fan Wu et al.

COMPUTERS & ELECTRICAL ENGINEERING (2015)

Article Computer Science, Information Systems

Security Busters: Web browser security vs. rogue sites

Nikos Virvilis et al.

COMPUTERS & SECURITY (2015)

Article Computer Science, Cybernetics

Hierarchy of users' web passwords: Perceptions, practices and susceptibilities

S. M. Taiabul Haque et al.

INTERNATIONAL JOURNAL OF HUMAN-COMPUTER STUDIES (2014)

Article Computer Science, Information Systems

Shoulder-surfing-proof graphical password authentication scheme

Tzong-Sun Wu et al.

INTERNATIONAL JOURNAL OF INFORMATION SECURITY (2014)

Article Computer Science, Information Systems

Analysis of a two-factor graphical password scheme

Luigi Catuogno et al.

INTERNATIONAL JOURNAL OF INFORMATION SECURITY (2014)

Article Computer Science, Hardware & Architecture

A survey of emerging threats in cybersecurity

Julian Jang-Jaccard et al.

JOURNAL OF COMPUTER AND SYSTEM SCIENCES (2014)

Article Computer Science, Artificial Intelligence

A review of biometric technology along with trends and prospects

J. A. Unar et al.

PATTERN RECOGNITION (2014)

Article Computer Science, Cybernetics

MTi: A method for user identification for multitouch displays

Bojan Blazica et al.

INTERNATIONAL JOURNAL OF HUMAN-COMPUTER STUDIES (2013)

Article Telecommunications

Using trusted computing for privacy preserving keystroke-based authentication in smartphones

Mohammad Nauman et al.

TELECOMMUNICATION SYSTEMS (2013)

Review Multidisciplinary Sciences

A Survey of Keystroke Dynamics Biometrics

Pin Shen Teh et al.

SCIENTIFIC WORLD JOURNAL (2013)

Article Computer Science, Theory & Methods

Graphical Passwords: Learning from the First Twelve Years

Robert Biddle et al.

ACM COMPUTING SURVEYS (2012)

Article Computer Science, Information Systems

A crypto-biometric scheme based on iris-templates with fuzzy extractors

R. Alvarez Marino et al.

INFORMATION SCIENCES (2012)

Article Computer Science, Cybernetics

Rational security: Modelling everyday password use

Geoffrey B. Duggan et al.

INTERNATIONAL JOURNAL OF HUMAN-COMPUTER STUDIES (2012)

Article Computer Science, Artificial Intelligence

Phase congruency induced local features for finger-knuckle-print recognition

Lin Zhang et al.

PATTERN RECOGNITION (2012)

Article Computer Science, Artificial Intelligence

Ear recognition based on local information fusion

Li Yuan et al.

PATTERN RECOGNITION LETTERS (2012)

Proceedings Paper Computer Science, Theory & Methods

The Quest to Replace Passwords: A Framework for Comparative Evaluation of Web Authentication Schemes

Joseph Bonneau et al.

2012 IEEE SYMPOSIUM ON SECURITY AND PRIVACY (SP) (2012)

Article Computer Science, Theory & Methods

User Study, Analysis, and Usable Security of Passwords Based on Digital Objects

Robert Biddle et al.

IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY (2011)

Article Computer Science, Information Systems

Token-based graphical password authentication

John Charles Gyorffy et al.

INTERNATIONAL JOURNAL OF INFORMATION SECURITY (2011)

Article Computer Science, Artificial Intelligence

Keystroke dynamics in password authentication enhancement

Pin Shen Teh et al.

EXPERT SYSTEMS WITH APPLICATIONS (2010)

Article Computer Science, Cybernetics

Feasibility study of tactile-based authentication

Ravi Kuber et al.

INTERNATIONAL JOURNAL OF HUMAN-COMPUTER STUDIES (2010)

Article Computer Science, Artificial Intelligence

Dynamic tongueprint: A novel biometric identifier

David Zhang et al.

PATTERN RECOGNITION (2010)

Article Computer Science, Information Systems

A comprehensive simulation tool for the analysis of password policies

Richard Shay et al.

INTERNATIONAL JOURNAL OF INFORMATION SECURITY (2009)

Review Computer Science, Artificial Intelligence

Image understanding for iris biometrics: A survey

Kevin W. Bowyer et al.

COMPUTER VISION AND IMAGE UNDERSTANDING (2008)

Article Computer Science, Information Systems

Improvement of keystroke data quality through artificial rhythms and cues

Pilsung Kang et al.

COMPUTERS & SECURITY (2008)

Article Computer Science, Information Systems

The seven flaws of identity management - Usability and security challenges

Rachna Dhamija et al.

IEEE SECURITY & PRIVACY (2008)

Article Computer Science, Artificial Intelligence

eigenPulse: Robust human identification from cardiovascular function

John M. Irvine et al.

PATTERN RECOGNITION (2008)

Article Computer Science, Cybernetics

Improving password security and memorability to protect personal and organizational information

Kim-Phuong L. Vu et al.

INTERNATIONAL JOURNAL OF HUMAN-COMPUTER STUDIES (2007)

Article Computer Science, Cybernetics

The usability of passphrases for authentication: An empirical field study

Mark Keith et al.

INTERNATIONAL JOURNAL OF HUMAN-COMPUTER STUDIES (2007)

Article Computer Science, Cybernetics

PassPoints: Design and longitudinal evaluation of a graphical password system

S Wiedenbeck et al.

INTERNATIONAL JOURNAL OF HUMAN-COMPUTER STUDIES (2005)

Article Computer Science, Information Systems

Password memorability and security: Empirical results

J Yan et al.

IEEE SECURITY & PRIVACY (2004)

Article Engineering, Electrical & Electronic

Transforming the 'weakest link' - a human/computer interaction approach to usable and effective security

MA Sasse et al.

BT TECHNOLOGY JOURNAL (2001)