Identifying smartphone users based on how they interact with their phones
The continuous advancement in the Internet of Things technology allows people to connect
anywhere at any time, thus showing great potential in technology like smart devices
(including smartphones and wearable devices). However, there is a possible risk of
unauthorized access to these devices and technologies. Unfortunately, frequently used
authentication schemes for protecting smart devices (such as passwords, PINs, and pattern
locks) are vulnerable to many attacks. USB tokens and hardware keys have a risk of being …
anywhere at any time, thus showing great potential in technology like smart devices
(including smartphones and wearable devices). However, there is a possible risk of
unauthorized access to these devices and technologies. Unfortunately, frequently used
authentication schemes for protecting smart devices (such as passwords, PINs, and pattern
locks) are vulnerable to many attacks. USB tokens and hardware keys have a risk of being …
[CITATION][C] Identifying smartphone users based on how they interact with their phones, Human-centric Comput
MA Alqarni, S Chauhdary, M Malik… - Inf. Sci, 2020
Showing the best results for this search. See all results