Secure Pick Up: Implicit Authentication When You Start Using the Smartphone.
Wei-Han LeeXiaochen LiuYilin ShenHongxia JinRuby B. LeePublished in: SACMAT (2017)
Keyphrases
- authentication mechanism
- user authentication
- authentication scheme
- security mechanisms
- data encryption
- password authentication
- factor authentication
- identity management
- authentication protocol
- security analysis
- integrity verification
- key distribution
- security requirements
- secure manner
- security services
- public key cryptography
- mobile devices
- smart card
- private key
- key agreement
- public key
- rights management
- identity authentication
- digital signature
- mobile applications
- daily life
- mutual authentication
- biometric authentication
- key agreement protocol
- information security
- security issues
- encryption decryption
- wireless sensor networks
- secure communication
- security protocols
- personal information
- information sharing
- access control
- image authentication
- cryptographic protocols
- secret sharing scheme
- electronic payment
- key exchange protocol
- key management
- secret key
- security policies
- trusted platform module
- lightweight