References
- Apple Touch ID, https://support.apple.com/en-us/HT204587, Accessed: 2018-02-01.
- Iris Scanner, http://www.samsung.com/global/galaxy/galaxy-s8/security/ Accessed: 2018-02-01.
- Ivan Cherapau, Ildar Muslukhov, Nalin Asanka, Konstantin Beznosov, "On the Impact of Touch ID on iPhone Passcodes," Usenix Symposium On Usable Privacy and Security, 2015.
- Samsung Smart Lock, https://www.samsung.com/us/support/answer/ANS00062631/, Accessed: 2018-02-01.
- Hugo Gascon, Sebastian Uellenbeck, Christopher Wolf, and Konrad Rieck, "Continuous authentication on mobile devices by analysis of typing motion behavior," In Proceedings of GI Conference Sicherheit, 2014.
- Yazan Badin, "Contextual authentication using mobile phone movements to authenticate owners implicitly," Master Thesis, University of Twente Department of Computer Science, Enschede, 2016.
- Javid Maghsoudi, and Charles C. Tappert, "A behavioral biometrics user authentication study using motion data from android smartphones," European Intelligence and Security Informatics Conference, IEEE, 2016.
- Wei-Han Lee, and Ruby Lee, "Implicit sensor-based authentication of smartphone users with smartwatch," In Proceedings of the Hardware and Architectural Support for Security and Privacy, 2016.
- Wei-Han Lee, and Ruby B. Lee, "Multi-sensor authentication to improve smartphone security," In Proceedings of International Conference on Information Systems Security and Privacy, 2017.
- Hilmi G. Kayacik, Mike Just, Lynne Baillie, and David Aspinall, "Data driven authentication: On the effectiveness of user behaviour modelling with mobile device sensors," Mobile Security Technologies, 2014.
- Lex Fridman, Steven Weber, Rachel Greenstadt, and Moshe Kam, "Active authentication on mobile devices via stylometry, application usage, web browsing, and GPS Location," System Journal, IEEE, 2017.
- Senaka Buthpitiya, Ying Zhang, Anind K. Dey, and Martin Griss, "n-gram geo-trace modeling", International Conference on Pervasive Computing, 2011.
- Elain Shi, Yuan Niu, Markus Jakobsson, and Richard Chow, "Implicit authentication through learning user behavior," In Proceedings of International Conference on Information Security, 2010.
- Z. Chair and P. Varshney, "Optimal data fusion in multiple sensor detection system", IEEE Transactions on Aerospace and Electronic System, 1986.
- Ioannis Agadakos, Per Hallgren, Dimitrios Damopoulos, Andrei Sabelfeld, and Georgios Portokalidis, "Location-enhanced Authentication using the IoT Because You Cannot Be in Two Places at Once," In Proceedings of Annual Computer Security Applications Conference, 2016.
- John Paul Dunning, "Taming the Blue Beast A Survey of Bluetooth-Based Threats," IEEE Security & Privacy 8 (2), 2010.
- Mossab Baloul, Estelle Cherrier, and Christophe Rosenberger, " Challenge based speaker recognition for mobile authentication," In Proceedings of the International Conference on Biometrics Special Interest Group, IEEE, 2012.
- Cory Cornelius, Zachary Marois, Jacob Sorber, Ron Peterson, Shrirang Mare, and David Kotz, "Vocal resonance as a passive biometric," 2014.
- Amitava Das, Ohil K Manyam, Makarand Tapaswi, and Veeresh Taranalli, "Multilingual spoken-password based user authentication in emerging economiesusing cellular phone networks," In Spoken Language Technology Workshop, IEEE, 2008.
- Max Kunz, Klaus Kasper, Herbert Reininger, Manuel Möbius, and Jonathan Ohms, "Continuous Speaker Verication in Realtime," In Proceedings of the International Conference on Biometrics Special Interest Group, IEEE, 2011.
- Mumtaj Begam Lindasalwa Muda and I. Elamvazuthi, "Voice Recognition Algorithms using Mel Frequency Cepstral Coecient (MFCC) and Dynamic Time Warping (DTW) Techniques," Journal Of Computing 2, 3, 138-143, 2010.
- X. D. Huang, Y. Ariki, and M. A. Jack, "Hidden Markov Models for Speech Recognition," 1990.
- Florentin Thullier, Bruno Bouchard and Bob-Antoine J. Menelas, "A Text-Independent Speaker Authentication System for Mobile Devices," cryptography, 1(3), 16, 2017. https://doi.org/10.3390/cryptography1030016
- Andrew Boles and Paul Rad, "Voice Biometrics: Deep Learning-based Voiceprint Authentication," In Proceeding of International Conference on System of Systems Engineering, 2017.
- Laurynas Dovydaitis, Tomas Rasymas, and Vytautas Rudzionis, "Speaker Authentication System Based on Voice Biometrics and Speech Recognition," In Proceedings of International Conference on Business Information Systems, 2017.
- Zheng Yan and Sihui Zhao, "A Usable Authentication System based on Personal Voice Challenge," In Proceedings of International Conference on Advanced Cloud and Big Data, 2016.
- R.C. Johnson, Terrance E. Boult, and Walter J. Scheirer, "Voice authentication using short phrases: Examining accuracy, security and privacy issues," In Proceedings of IEEE 6th International Conference on Biometric: Theory, Applications and Systems, 2017.