Unobservable Re-authentication for Smartphones.
Lingjun LiXinxin ZhaoGuoliang XuePublished in: NDSS (2013)
Keyphrases
- mobile devices
- biometric authentication
- authentication scheme
- authentication protocol
- desktop computers
- authentication mechanism
- identity authentication
- user authentication
- data encryption
- neural network
- mobile applications
- daily life
- fragile watermarking
- key distribution
- security analysis
- smart phones
- identity management
- smart card
- digital images
- factor authentication