1 |
C. Braz, and J. M. Robert, "Security and usability: the case of the user authentication methods," In Proc. of IHM '06, pp. 199-203, 2006.
|
2 |
D. T. Toledano, R. F. Pozo, A. H. Trapote and L. H. Gomez, "Usability evaluation of multi-modal biometric verification systems," Interacting with Computers, 18(5), vol. 18, no. 5, pp. 1101-1122, Sept, 2006.
DOI
|
3 |
H. Khan, A. Atwater, and U. Hengartner, "A comparative Evaluation of Implicit Authentication Schemes," In Proc. of RAID, pp. 255-275, Sep. 2014.
|
4 |
N. L. Clarke, and S. M. Furnell, "Authentication of users on mobile telephones - A survey of attitudes and practices," Computers & Security, vol. 24, no. 7, pp. 519-527, 2005.
DOI
|
5 |
N. Micallef, M. Just, L. Baillie, M. Halvey, and H. G. Kayacik, "Why aren't users using protection? Investigating the usability of smartphone locking," Iin Proc. of MobileHCI, 2015.
|
6 |
S. Trewin, C. Swart, L. Koved, J. Martino, K. Singh, and S. B. David, "Biometric Authentication on a Mobile Device: A Study of User Effort, Error and Task Disruption," In Proc. of ACSAC, pp. 159-168, Dec. 2012.
|
7 |
S. Prabhakar, S. Pankanti, and A. K. Jain, "Biometric Recognition: Security and Privacy Concerns," In Proc. of IEEE S&P, vol. 99, no. 2, pp. 33-42, 2003.
|
8 |
S. M. Furnell, P. S. Dowland, H. M. Illingworth, and P. L. Reynolds, "Authentication and Supervision: A Survey of User Attitudes," Computers & Security, vol. 19, no. 6, pp. 529-539, Oct., 2000.
DOI
|
9 |
K. Taekyoung, and N. Sarang "TinyLock: Affordable defense against smudge attacks on smartphone pattern lock systems." computers & security, vo. 42, pp. 137-150, 2014.
DOI
|
10 |
DIGIECO report, "2016 Mobile Trend Forecast," 2016.
|