Login / Signup

Targeted Mimicry Attacks on Touch Input Based Implicit Authentication Schemes.

Hassan KhanUrs HengartnerDaniel Vogel
Published in: MobiSys (2016)
Keyphrases
  • security mechanisms
  • semi fragile watermarking
  • input data
  • security threats
  • detect malicious
  • digital watermarking
  • access control
  • countermeasures
  • resource constrained
  • security systems
  • biometric authentication