A novel transparent user authentication approach for mobile applications.
Saud AlotaibiSteven FurnellNathan L. ClarkePublished in: Inf. Secur. J. A Glob. Perspect. (2018)
Keyphrases
- mobile applications
- user authentication
- authentication scheme
- mobile devices
- mobile phone
- security analysis
- context aware
- user experience
- biometric authentication
- keystroke dynamics
- information security
- smart phones
- biometric systems
- authentication protocol
- end users
- remote user authentication scheme
- wireless devices
- user behavior