메뉴 건너뛰기




Volumn , Issue , 2012, Pages 987-996

Touch me once and i know it's you! Implicit authentication based on touch screen patterns

Author keywords

Implicit authentication; Password pattern; Security

Indexed keywords

AUTHENTICATION SCHEME; DYNAMIC TIME WARPING; LOG DATA; ON CURRENTS; PASSWORD PATTERN; SCREEN PATTERN; SECURITY; SHAPE BASED; USER INPUT;

EID: 84862067265     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1145/2207676.2208544     Document Type: Conference Paper
Times cited : (442)

References (38)
  • 5
    • 0040490584 scopus 로고
    • Computer text-editing: An information-processing analysis of a routine cognitive skill
    • Card, S., Moran, T., Newell, A. Computer text-editing: An information-processing analysis of a routine cognitive skill. Cognitive Psychology, 12(1). (1980), 32-74.
    • (1980) Cognitive Psychology , vol.12 , Issue.1 , pp. 32-74
    • Card, S.1    Moran, T.2    Newell, A.3
  • 8
    • 0036276843 scopus 로고    scopus 로고
    • Acceptance of subscriber authentication methods for mobile telephony devices
    • Clarke, N.L., Furnell, S.M., Rodwell, P.M., Reynolds P.L. Acceptance of subscriber authentication methods for mobile telephony devices. Computers & Security, 21 (3). (2002), 220-228.
    • (2002) Computers & Security , vol.21 , Issue.3 , pp. 220-228
    • Clarke, N.L.1    Furnell, S.M.2    Rodwell, P.M.3    Reynolds, P.L.4
  • 9
    • 0037699592 scopus 로고    scopus 로고
    • Usability and biometric verification at the ATM interface
    • ACM Press
    • Coventry, L., De Angeli, A., Johnson, G. Usability and biometric verification at the ATM interface. In Proceed-ings CHI 2003. ACM Press (2003), 153-160.
    • (2003) Proceed-ings CHI 2003 , pp. 153-160
    • Coventry, L.1    De Angeli, A.2    Johnson, G.3
  • 10
    • 84950377558 scopus 로고
    • Recognizing friends by their walk: Gait perception without familiarity cues
    • Cutting, J., Kozlowski, L. Recognizing friends by their walk: Gait perception without familiarity cues. Bulletin of the Psychonomic Society, 9(5). (1977), 353-356.
    • (1977) Bulletin of the Psychonomic Society , vol.9 , Issue.5 , pp. 353-356
    • Cutting, J.1    Kozlowski, L.2
  • 11
    • 70350716569 scopus 로고    scopus 로고
    • Look into my eyes! Can you guess my password? in
    • ACM Press
    • De Luca, A., Denzel, M. and Hussmann, H. Look into my eyes! Can you guess my password? In Proceedings SOUPS 2009. ACM Press (2009), 7:1-7:12.
    • (2009) Proceedings SOUPS 2009 , pp. 71-712
    • De Luca, A.1    Denzel, M.2    Hussmann, H.3
  • 12
    • 69249127514 scopus 로고    scopus 로고
    • Do background images improve "draw a secret" graphical passwords?
    • ACM Press
    • Dunphy, P., Yan, J. Do background images improve "draw a secret" graphical passwords? In Proceedings CCS 2007. ACM Press (2007), 36-47.
    • (2007) Proceedings CCS 2007 , pp. 36-47
    • Dunphy, P.1    Yan, J.2
  • 13
    • 0006422102 scopus 로고
    • Factors in the retention and re-learning of perceptual-motor skill
    • Fleishman, E., Parker, J. Factors in the retention and re-learning of perceptual-motor skill. Journal of Experi-mental Psychology, 64. (1962), 215-226.
    • (1962) Journal of Experi-mental Psychology , vol.64 , pp. 215-226
    • Fleishman, E.1    Parker, J.2
  • 15
    • 70349448250 scopus 로고    scopus 로고
    • Computing and visualizing dynamic time warping alignments
    • R: the DTW package
    • Giorgino, T. Computing and visualizing dynamic time warping alignments in R: the DTW package. Journal of Statistical Software, 31(7). (2009), 1-24.
    • (2009) Journal of Statistical Software , vol.31 , Issue.7 , pp. 1-24
    • Giorgino, T.1
  • 16
    • 51449118740 scopus 로고    scopus 로고
    • Biometric gait au-thentication using accelerometer sensor
    • Academy Publisher
    • Gafurov, D., Helkala, K., Søndrol, T. Biometric gait au-thentication using accelerometer sensor. Journal of Com-puters, 1 (7). Academy Publisher (2006), 51-59.
    • (2006) Journal of Com-puters , vol.1 , Issue.7 , pp. 51-59
    • Gafurov, D.1    Helkala, K.2    Søndrol, T.3
  • 20
    • 84887058303 scopus 로고    scopus 로고
    • Can i borrow your phone? Understanding concerns when sharing mobile phones
    • ACM Press
    • Karlson, A., Brush, A.J., Schechter, S. Can i borrow your phone? Understanding concerns when sharing mobile phones. In Proceedings CHI 2009. ACM Press (2009), 1647-1650.
    • (2009) Proceedings CHI 2009 , pp. 1647-1650
    • Karlson, A.1    Brush, A.J.2    Schechter, S.3
  • 22
    • 0041108231 scopus 로고
    • Dynamic identity verification via keystroke characteristics
    • Academic Press Ltd
    • Legget, J., Williams, G., Usnick, M. Dynamic identity verification via keystroke characteristics. International Journal of Man-Machine Studies, 35 (6). Academic Press Ltd (1991), 859-870.
    • (1991) International Journal of Man-Machine Studies , vol.35 , Issue.6 , pp. 859-870
    • Legget, J.1    Williams, G.2    Usnick, M.3
  • 26
    • 51049103392 scopus 로고    scopus 로고
    • Understanding user perspectives on biometric technology
    • ACM Press
    • Pons, A.P., Polak, P. Understanding user perspectives on biometric technology. Commun. ACM, 51 (9). ACM Press (2008), 115-118.
    • (2008) Commun. ACM , vol.51 , Issue.9 , pp. 115-118
    • Pons, A.P.1    Polak, P.2
  • 28
    • 47749126623 scopus 로고    scopus 로고
    • Cell phones personal authentication systems using multimodal biometrics
    • Springer
    • Rokita, J. Krzyzak, A., Suen, C.Y. Cell phones personal authentication systems using multimodal biometrics. In Proceedings ICIAR 2008. Springer (2008), 1013-1022.
    • (2008) Proceedings ICIAR 2008 , pp. 1013-1022
    • Rokita Krzyzak J, A.1    Suen, C.Y.2
  • 30
    • 0031022919 scopus 로고    scopus 로고
    • Functional stages in the formation of human long-term motor memory
    • Shadmer, R., Brashers-Krug, T. Functional stages in the formation of human long-term motor memory. The Journal of Neuroscience, 17(1). (1997), 409-419.
    • (1997) The Journal of Neuroscience , vol.17 , Issue.1 , pp. 409-419
    • Shadmer, R.1    Brashers-Krug, T.2
  • 31
    • 85037074313 scopus 로고    scopus 로고
    • Implicit au-thentication through learning user behavior
    • Springer
    • Shi, E., Niu, Y., Jakobsson, M., Chow, R. Implicit au-thentication through learning user behavior. In Proceed-ings ISC 2010. Springer (2011), 99-113.
    • (2011) Proceed-ings ISC 2010 , pp. 99-113
    • Shi, E.1    Niu, Y.2    Jakobsson, M.3    Chow, R.4
  • 35
    • 84961930273 scopus 로고
    • The use of passwords for controlled access to remote computer systems and services
    • ACM Press
    • Wood, H.M. The use of passwords for controlled access to remote computer systems and services. In Proceedings AFIPS 1977. ACM Press(1977), 27-33.
    • (1977) Proceedings AFIPS 1977 , pp. 27-33
    • Wood, H.M.1
  • 36
    • 70049098777 scopus 로고    scopus 로고
    • PassShapes: Utilizing stroke based authentication to increase password memorability
    • ACM Press
    • Weiss, R., De Luca, A. PassShapes: utilizing stroke based authentication to increase password memorability. In Proceedings NordiCHI 2008. ACM Press (2008), 383-392.
    • (2008) Proceedings NordiCHI 2008 , pp. 383-392
    • Weiss, R.1    De Luca, A.2
  • 37
  • 38
    • 84863085276 scopus 로고    scopus 로고
    • Sensitivity specificity, ac-curacy, associated confidence interval and ROC analysis with practical SAS® implementations
    • Zhu, W., Zeng, N., Wang, N. Sensitivity, specificity, ac-curacy, associated confidence interval and ROC analysis with practical SAS® implementations. In Proceedings Nesug 2010.
    • Proceedings Nesug 2010
    • Zhu, W.1    Zeng, N.2    Wang, N.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.