Acknowledgement
Grant : 상황인지 기반 멀티팩터 인증 및 전자서명을 제공하는 범용 인증 플랫폼 기술 개발
Supported by : 정보통신기술진흥센터
References
- O. Riva, C. Qin, K. Strauss, and D. Lymberopoulos, "Progressive authentication: deciding when to authenticate on mobile phones," Proc. of USENIX Security'12, 2012.
- H. Khan, A. Awwater, and U. Hengartner, "Itus: An Implicit Authentication Framework for Android," proc. of ACM Mobicom'14, pp. 507-518, 2014.
- C. Bo, L. Zhang, X.-Y. Li, Q. Huang, and Y. Wang. "Silentsense: silent user identi_cation via touch and movement behavioral biometrics," Proc. of the 19th Annual International Conference on Mobile Computing & Networking, pp. 187-190, ACM, 2013.
- T. Feng, X. Zhao, B. Carbunar, and W. Shi. "Continuous mobile authentication using virtual key typing biometrics," 12th IEEE International Conference on Trust, Security and Privacy in Computing and Communications, pp. 1547-1552, IEEE, 2013.
- M. Frank, R. Biedert, E. Ma, I. Martinovic, and D. Song, "Touchalytics: On the applicability of touchscreen input as a behavioral biometric for continuous authentication, IEEE Transactions on Information Forensics and Security, Vol. 8, No. 1, pp. 136-148, 2013. https://doi.org/10.1109/TIFS.2012.2225048
- A. Stavrou et al., "A Comparative Evaluation of Implicit Authentication Schemes," Proc. of RAID 2014, LNCS 8688, pp. 255-275, 2014.
- R. Murmuria, A. Stavrou, D. Barbara, and D. Fleck, "Continuous Authentication on Mobile Devices Using Power Consumption, Touch Gesture and Physical Movement of Users," Proc. of RAID 2015, LNCS 9404, pp. 405-434, 2015.
- S. Egelman, S. Jain, R. S. Portnoff, K. Liao, S. Consolvo, and D. Wagner, "Are You Ready to Lock?: Understanding User Motivations for Smartphone Locking Behaviors," Proc. of ACM CCS'14, pp. 750-761, 2014.
- M. Harbach, E. Zezschwitz, A. Fichtner, A. De Luca, and M. Smith, "It's a Hard Lock Life: A field Study of Smartphone (Un)Locking Behavior and Risk Perception," Proc. of USENIX Symposium on Usable Privacy and Security (SOUPS) 2014, pp. 213-230.
- Byungbo Nam, "Comparative Analysis of the Multifactor Authentication Techniques based on a Mobile Device," Depart of Industry System Engineering Graduate School of Industry Chungnam National Univ. Korea, pp. 12-15, 2015.
- Gi jong Lee, "Eye, Nose, Mouse are authentication. Financial institutions, the introduction is sell," iPnomics, [Online]. Available: http://www.ipnomics.co.kr/?p=32936, 2015.
- Huang zhihui, "Multimodal Biometrics base on Face and Speech Recognition for mobile computing Environment," Department of Computer Engineering The Graduate School Sejon Univ. Korea, pp. 67-70, 2015.