A Proximity Authentication System for Smartphones

نویسندگان
چکیده

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Unobservable Re-authentication for Smartphones

The widespread usage of smartphones gives rise to new security and privacy concerns. Smartphones are becoming a personal entrance to networks, and may store private information. Due to its small size, a smartphone could be easily taken away and used by an attacker. Using a victim’s smartphone, the attacker can launch an impersonation attack, which threatens the security of current networks, esp...

متن کامل

Introducing touchstroke: keystroke-based authentication system for smartphones

Keystroke dynamics is a well-investigated behavioral biometric based on the way and rhythm in which someone interacts with a keyboard or keypad when typing characters. This paper explores the potential of this modality but for touchscreenequipped smartphones. The main research question posed is whether “touchstroking” can be effective in building the biometric profile of a user, in terms of typ...

متن کامل

Unsupervised Proximity Detection and Pairing for Smartphones

User context, especially physical proximity, is gaining its popularity as an intelligent indicator to trigger communication between devices. Apple’s iBeacon sends out notification to iPhones when customers enter their Apple stores. It detects proximity by ranging Bluetooth beacon signals emitted from anchor nodes that are preinstalled in the store. Many short-range communication methods adopted...

متن کامل

Under the table: tap authentication for smartphones

Current smartphone authentication methods are known to be susceptible to even rudimentary attacks based on observation. In this paper, we propose an approach to authentication based on rich tapping patterns that addresses this problem. We present a novel tapping detection technique, using a single example as a template. We also report on two user studies (N = 30 and N = 19) where tapping authen...

متن کامل

User Authentication in Smartphones for Telehealth

Many functions previously conducted on desktop computers are now performed on smartphones. Smartphones provide convenience, portability, and connectivity. When smartphones are used in the conduct of telehealth, sensitive data is invariably accessed, rendering the devices in need of user authentication to ensure data protection. User authentication of smartphones can help mitigate potential Heal...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: IEEE Transactions on Dependable and Secure Computing

سال: 2016

ISSN: 1545-5971

DOI: 10.1109/tdsc.2015.2427848