Secure and Usable User-in-a-Context Continuous Authentication in Smartphones Leveraging Non-Assisted Sensors.
José María de FuentesLorena González-ManzanoArturo RibagordaPublished in: Sensors (2018)
Keyphrases
- user authentication
- authentication scheme
- security analysis
- user model
- mobile devices
- keystroke dynamics
- real time
- context dependent
- authentication protocol
- identity management
- biometric authentication
- key distribution
- user centric
- user interaction
- password authentication
- integrity verification
- contextual information
- authentication mechanism
- security mechanisms
- smart card
- user experience
- security issues
- context aware
- factor authentication
- secure manner
- data encryption
- end users
- mutual authentication
- key agreement protocol
- user privacy
- relevance feedback
- private key
- desktop computers
- user preferences
- security requirements
- mobile applications