Secure Pick Up: Implicit Authentication When You Start Using the Smartphone.
Wei-Han LeeXiaochen LiuYilin ShenHongxia JinRuby B. LeePublished in: CoRR (2017)
Keyphrases
- authentication mechanism
- user authentication
- authentication scheme
- security mechanisms
- password authentication
- data encryption
- authentication protocol
- identity management
- security analysis
- key distribution
- security requirements
- factor authentication
- integrity verification
- secure manner
- mobile devices
- security services
- public key cryptography
- rights management
- secure communication
- identity authentication
- security issues
- resource constrained
- smart card
- public key
- biometric authentication
- mutual authentication
- key agreement protocol
- key agreement
- key exchange protocol
- public key encryption
- private key
- security properties
- security protocols
- key management
- information sharing
- lightweight
- personal information
- daily life
- trusted third party
- public key infrastructure
- electronic payment
- digital signature
- secret key