메뉴 건너뛰기




Volumn 7763 LNCS, Issue , 2013, Pages 331-350

Touch gestures based biometric authentication scheme for touchscreen mobile phones

Author keywords

Access control; Behavioral biometrics; Mobile security and usability; Touch dynamics; User authentication

Indexed keywords

BEHAVIORAL BIOMETRICS; BEHAVIORAL FEATURES; BIOMETRIC AUTHENTICATION; LEARNING CLASSIFIERS; MOBILE SECURITY; NEURAL NETWORK CLASSIFIER; USER AUTHENTICATION; USER AUTHENTICATION SCHEME;

EID: 84879481969     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/978-3-642-38519-3_21     Document Type: Conference Paper
Times cited : (113)

References (53)
  • 1
    • 34547965365 scopus 로고    scopus 로고
    • A new biometrie technology based on mouse dynamics
    • DOI 10.1109/TDSC.2007.70207
    • Ahmed, A.A.E., Traore, I.: A New Biometric Technology based on Mouse Dynamics. IEEE Transactions on Dependable and Secure Computing 4(3), 165-179 (2007) (Pubitemid 47274809)
    • (2007) IEEE Transactions on Dependable and Secure Computing , vol.4 , Issue.3 , pp. 165-179
    • Ahmed, A.A.E.1    Traore, I.2
  • 3
    • 0000588294 scopus 로고
    • Improving the generalization properties of radial basis function neural networks
    • Bishop, C.: Improving the Generalization Properties of Radial Basis Function Neural Networks. Neural Computation 3(4), 579-588 (1991)
    • (1991) Neural Computation , vol.3 , Issue.4 , pp. 579-588
    • Bishop, C.1
  • 5
    • 26844493026 scopus 로고    scopus 로고
    • Telephones -a survey of attitudes and practices
    • Clarke, N.L., Furnell, S.M.: Telephones -A Survey of Attitudes and Practices. Computers & Security 24(7), 519-527 (2005)
    • (2005) Computers & Security , vol.24 , Issue.7 , pp. 519-527
    • Clarke, N.L.1    Furnell, S.M.2
  • 6
    • 33845701766 scopus 로고    scopus 로고
    • Authenticating mobile phone users using keystroke analysis
    • DOI 10.1007/s10207-006-0006-6
    • Clarke, N.L., Furnell, S.M.: Authenticating Mobile Phone Users Using Keystroke Analysis. International Journal of Information Security 6(1), 1-14 (2007) (Pubitemid 44963965)
    • (2007) International Journal of Information Security , vol.6 , Issue.1 , pp. 1-14
    • Clarke, N.L.1    Furnell, S.M.2
  • 11
    • 0003578240 scopus 로고
    • An empirical study of learning speed in back-propagation networks
    • Carnegie Mellon University, Pittsburgh, PA 15213
    • Fahlman, S.E.: An Empirical Study of Learning Speed in Back-propagation Networks. Technical Report CMU-CS-88-162, Carnegie Mellon University, Pittsburgh, PA 15213 (1988)
    • (1988) Technical Report CMU-CS- 88-162
    • Fahlman, S.E.1
  • 12
    • 78649635621 scopus 로고    scopus 로고
    • Multi-touch user interface evaluation for 3d object manipulation on mobile devices
    • Fiorella, D., Sanna, A., Lamberti, F.: Multi-touch User Interface Evaluation for 3D Object Manipulation on Mobile Devices. Journal on Multimodal User Interfaces 4(1), 3-10 (2010)
    • (2010) Journal on Multimodal User Interfaces , vol.4 , Issue.1 , pp. 3-10
    • Fiorella, D.1    Sanna, A.2    Lamberti, F.3
  • 15
    • 36249004860 scopus 로고    scopus 로고
    • Keystroke analysis for thumb-based keyboards on mobile devices
    • Venter, H., Elofif, M., Labuschagne, L., Elofif, J., von Solms, R. (eds.). Springer, Boston
    • Karatzouni, S., Clarke, N.: Keystroke Analysis for Thumb-based Keyboards on Mobile Devices. In: Venter, H., Elofif, M., Labuschagne, L., Elofif, J., von Solms, R. (eds.) New Approaches for Security, Privacy and Trust in Complex Environments. IFIP, vol. 232, pp. 253-263. Springer, Boston (2007)
    • (2007) New Approaches for Security, Privacy and Trust in Complex Environments. IFIP , vol.232 , pp. 253-263
    • Karatzouni, S.1    Clarke, N.2
  • 19
    • 79960002981 scopus 로고    scopus 로고
    • A personal identification system using retinal vasculature in retinal fundus images
    • Köse, C., ?Ikibaş, C.: A Personal Identification System using Retinal Vasculature in Retinal Fundus Images. Expert Systems with Applications 38(11), 13670-13681 (2011)
    • (2011) Expert Systems with Applications , vol.38 , Issue.11 , pp. 13670-13681
    • Köse, C.1    Ikibaş, C.2
  • 22
    • 35048874685 scopus 로고    scopus 로고
    • Training radial basis function networks with particle swarms
    • Yin, F.-L.,Wang, J., Guo, C. (eds.). Springer, Heidelberg, ISNN 2004
    • Liu, Y., Zheng, Q., Shi, Z., Chen, J.: Training Radial Basis Function Networks with Particle Swarms. In: Yin, F.-L.,Wang, J., Guo, C. (eds.) ISNN 2004. LNCS, vol. 3173, pp. 317-322. Springer, Heidelberg (2004)
    • (2004) LNCS , vol.3173 , pp. 317-322
    • Liu, Y.1    Zheng, Q.2    Shi, Z.3    Chen, J.4
  • 25
    • 3042781449 scopus 로고    scopus 로고
    • Toward reliable user authentication through biometrics
    • Matyás Jr., V., Riha, Z.: Toward Reliable User Authentication through Biometrics. IEEE Security and Privacy 1(3), 45-49 (2003)
    • (2003) IEEE Security and Privacy , vol.1 , Issue.3 , pp. 45-49
    • Matyás Jr., V.1    Riha, Z.2
  • 32
    • 0034140431 scopus 로고    scopus 로고
    • Keystroke dynamics as a biometric for authentication
    • DOI 10.1016/S0167-739X(99)00059-X
    • Monrose, F., Rubin, A.: Keystroke Dynamics as a Biometric for Authentication. Future Generation Computer Systems 16(4), 351-359 (2000) (Pubitemid 30552905)
    • (2000) Future Generation Computer Systems , vol.16 , Issue.4 , pp. 351-359
    • Monrose, F.1    Rubin, A.D.2
  • 33
    • 77958105748 scopus 로고    scopus 로고
    • Improving mouse dynamics biometric performance using variance reduction via extractors with Separate Features
    • Nakkabi, Y., Traoré, I., Ahmed, A.A.E.: Improving Mouse Dynamics Biometric Performance using Variance Reduction via Extractors with Separate Features. IEEE Transactions on Systems, Man, and Cybernetics, Part A 40(6), 1345-1353 (2010)
    • (2010) IEEE Transactions on Systems, Man, and Cybernetics, Part A , vol.40 , Issue.6 , pp. 1345-1353
    • Nakkabi, Y.1    Traoré, I.2    Ahmed, A.A.E.3
  • 34
    • 84879914389 scopus 로고    scopus 로고
    • Using trusted computing for privacy preserving keystrokebased authentication in Smartphones
    • Nauman, M., Ali, T., Rauf, A.: Using Trusted Computing for Privacy Preserving Keystrokebased Authentication in Smartphones. Telecommunication Systems, 1-13 (2011)
    • (2011) Telecommunication Systems , pp. 1-13
    • Nauman, M.1    Ali, T.2    Rauf, A.3
  • 37
    • 0029341018 scopus 로고
    • A detailed comparison of backpropagation neural network and maximum-likelihood classifiers for Urban Land Use Classification
    • Paola, J.D., Schowengerdt, R.A.: A Detailed Comparison of Backpropagation Neural Network and Maximum-likelihood Classifiers for Urban Land Use Classification. IEEE Transactions on Geoscience and Remote Sensing 33(4), 981-996 (1995)
    • (1995) IEEE Transactions on Geoscience and Remote Sensing , vol.33 , Issue.4 , pp. 981-996
    • Paola, J.D.1    Schowengerdt, R.A.2
  • 39
    • 69849091103 scopus 로고    scopus 로고
    • Hybrid learning enhancement of rbf network based on particle swarm optimization
    • Yu, W., He, H., Zhang, N. (eds.). Springer, Heidelberg
    • Qasem, S.N., Shamsuddin, S.M.: Hybrid Learning Enhancement of RBF Network based on Particle Swarm Optimization. In: Yu, W., He, H., Zhang, N. (eds.) ISNN 2009, Part III. LNCS, vol. 5553, pp. 19-29. Springer, Heidelberg (2009)
    • (2009) ISNN 2009, Part III. LNCS , vol.5553 , pp. 19-29
    • Qasem, S.N.1    Shamsuddin, S.M.2
  • 41
    • 0029678894 scopus 로고    scopus 로고
    • Improved use of continuous attributes in C4.5
    • Quinlan, J.R.: Improved Use of Continuous Attributes in C4.5. Journal of Artificial Intelligence Research 4(1), 77-90 (1996) (Pubitemid 126646149)
    • (1996) Journal of Artificial Intelligence Research , vol.4 , pp. 77-90
    • Quinlan, J.R.1
  • 45
    • 33744738243 scopus 로고    scopus 로고
    • Performance analysis of iris-based identification system at the matching score level
    • DOI 10.1109/TIFS.2006.873603
    • Schmid, N.A., Ketkar, M.V., Singh, H., Cukic, B.: Performance Analysis of Iris-based Identification System at the Matching Score Level. IEEE Transactions on Information Forensics and Security 1(2), 154-168 (2006) (Pubitemid 43824627)
    • (2006) IEEE Transactions on Information Forensics and Security , vol.1 , Issue.2 , pp. 154-168
    • Schmid, N.A.1    Ketkar, M.V.2    Singh, H.3    Cukic, B.4
  • 47
    • 34250782167 scopus 로고    scopus 로고
    • A comparison of perceived and real shoulder-surfing risks between alphanumeric and graphical passwords
    • DOI 10.1145/1143120.1143128, ACM International Conference Proceeding Series - Proceedings of the Second Symposium on Usable Privacy and Security, SOUPS 2006
    • Tari, F., Ozok, A.A., Holden, S.H.: A Comparison of Perceived and Real Shoulder-Surfing Risks between Alphanumeric and Graphical Passwords. In: Proceedings of the 2nd Symposium on Usable Privacy and Security (SOUPS), pp. 56-66. ACM, New York (2006) (Pubitemid 46966969)
    • (2006) ACM International Conference Proceeding Series , vol.149 , pp. 56-66
    • Tari, F.1    Ozok, A.A.2    Holden, S.H.3
  • 49
    • 84858388270 scopus 로고    scopus 로고
    • Cross-pollination of normalisation techniques from speaker to face authentication using Gaussian Mixture Models
    • Wallace, R.,McLaren,M.,McCool, C.,Marcel, S.: Cross-pollination of Normalisation Techniques from Speaker to Face Authentication using Gaussian Mixture Models. IEEE Transactions on Information Forensics and Security 7(2), 553-562 (2012)
    • (2012) IEEE Transactions on Information Forensics and Security , vol.7 , Issue.2 , pp. 553-562
    • Wallace, R.1    McLaren, M.2    McCool, C.3    Marcel, S.4
  • 51
    • 0033362601 scopus 로고    scopus 로고
    • Evolving artificial neural networks
    • DOI 10.1109/5.784219
    • Yao, X.: Evolving Artificial Neural Networks. Proceedings of the IEEE 87(9), 1423-1447 (1999) (Pubitemid 30503424)
    • (1999) Proceedings of the IEEE , vol.87 , Issue.9 , pp. 1423-1447
    • Yao, X.1
  • 52
    • 76649098286 scopus 로고    scopus 로고
    • Keystroke-based user identification on smart phones
    • Kirda, E., Jha, S., Balzarotti, D. (eds.). RAID 2009, Springer, Heidelberg
    • Zahid, S., Shahzad, M., Khayam, S.A., Farooq, M.: Keystroke-Based User Identification on Smart Phones. In: Kirda, E., Jha, S., Balzarotti, D. (eds.) RAID 2009. LNCS, vol. 5758, pp. 224-243. Springer, Heidelberg (2009)
    • (2009) LNCS , vol.5758 , pp. 224-243
    • Zahid, S.1    Shahzad, M.2    Khayam, S.A.3    Farooq, M.4


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.