Authentication

You are how you play: Authenticating mobile users via game playing

Nowadays, user authentication on mobile devices is principally based on a secret (e.g., password, PIN), while recently two-factors authentication methods have been proposed to make more secure such secret-based methods. Two-factors authentication …

Biometric Authentication Methods on Smartphones: A Survey

Nowadays, users are starting to develop a symbiotic bound with their smartphones. Users continuously carry these devices and use them for daily communication activities and social network interactions. On the other hand, a smartphone is equipped with …

On the effectiveness of sensor-enhanced keystroke dynamics against statistical attacks

In recent years, simple password-based authentication systems have increasingly proven ineffective for many classes of real-world devices. As a result, many researchers have concentrated their efforts on the design of new biometric authentication …