Login / Signup

A continuous user authentication scheme for mobile devices.

Max Smith-CreaseyMuttukrishnan Rajarajan
Published in: PST (2016)
Keyphrases
  • authentication scheme
  • user authentication
  • mobile devices
  • smart card
  • mobile phone
  • image encryption
  • real time
  • data mining techniques
  • secret key