Assentication: User De-authentication and Lunchtime Attack Mitigation with Seated Posture Biometric.
Tyler KaczmarekErcan OzturkGene TsudikPublished in: ACNS (2018)
Keyphrases
- user authentication
- biometric authentication
- authentication protocol
- keystroke dynamics
- personal authentication
- security analysis
- biometric data
- authentication systems
- identity verification
- user interface
- authentication scheme
- information security
- end users
- user centric
- malicious users
- authentication mechanism
- security level
- security requirements
- image authentication
- multimodal biometrics
- human body
- user profiles
- pattern recognition
- biometric authentication systems