Login / Signup
Reconstruction Attacks Against Mobile-Based Continuous Authentication Systems in the Cloud.
Mohammad Al-Rubaie
J. Morris Chang
Published in:
IEEE Trans. Inf. Forensics Secur. (2016)
Keyphrases
</>
authentication systems
biometric recognition
biometric authentication
user authentication
cloud computing
factor authentication
biometric authentication systems
high resolution
biometric systems
multimodal biometrics
high quality
wireless sensor networks
operating system
automatic recognition
security mechanisms