Login / Signup
Secure Pick Up: Implicit Authentication When You Start Using the Smartphone.
Wei-Han Lee
Xiaochen Liu
Yilin Shen
Hongxia Jin
Ruby B. Lee
Published in:
CoRR (2017)
Keyphrases
</>
authentication mechanism
user authentication
authentication scheme
security mechanisms
password authentication
data encryption
authentication protocol
identity management
security analysis
key distribution
security requirements
factor authentication
integrity verification
secure manner
mobile devices
security services
public key cryptography
rights management
secure communication
identity authentication
security issues
resource constrained
smart card
public key
biometric authentication
mutual authentication
key agreement protocol
key agreement
key exchange protocol
public key encryption
private key
security properties
security protocols
key management
information sharing
lightweight
personal information
daily life
trusted third party
public key infrastructure
electronic payment
digital signature
secret key