1 |
J.A. Muir, and P.C.V. Oorschot, "Internet geolocation: evasion and counterevasion," ACM Computing Surveys (CSUR), vol. 42, no. 1, Dec. 2009.
|
2 |
Sohee Park and Daeseon Choi, "Artificial intelligence security issues," Review of The Korea Institute of Information Security & Cryptology, 27(3), pp. 27-32, Jun. 2017.
|
3 |
D. Preuveneers, and W. Joosen, "SmartAuth: dynamic context fingerprinting for continuous user authentication," Proceedings of the 30th Annual ACM Symposium on Applied Computing, pp. 2185-2191, Apr. 2015.
|
4 |
E. Maiorana, P. Campisi, N. Gonzalez-Carballo, and A. Neri, "Keystroke dynamics authentication for mobile phones," Proceedings of the 2011 ACM Symposium on Applied Computing, pp. 21-26, 2011.
|
5 |
R. Shay, S. Komanduri, P.G. Kelley, M.L. Mazurek, L. Bauer, and L.F. Cranor, "Encountering stronger password requirements: user attitudes and behaviors," Proceedings of the Sixth Symposium on Usable Privacy and Security, ACM, Jul. 2010.
|
6 |
A. Das, J. Bonneau, M. Caesar, N. Borisov, and X. Wang, "The tangled web of password reuse," Proceedings of Network and Distributed System Security Symposium, Feb. 2014.
|
7 |
F. Tari, A. Ozok, and S.H. Holden, "A comparison of perceived and real shoulder-surfing risks between alphanumeric and graphical passwords," Proceedings of the Sixth Symposium on Usable Privacy and Security, ACM, pp. 56-66, Jul. 2006.
|
8 |
T. Feng, X. Zhao, B. Carbunar, and W. Shi, W. "Continuous mobile authentication using virtual key typing Biometrics," 12th International Conference on Trust, Security and Privacy in Computing and Communications, IEEE, pp. 1547-1552. Jul. 2013.
|
9 |
H. Crawford and E. Ahmadzadeh, "Authentication on the go: assessing the effect of movement on mobile device keystroke dynamics," In Thirteenth Symposium on Usable Privacy and Security, USENIX, pp. 163-173. Jul. 2017.
|
10 |
Seungsoo Nam, Changho Seo, and Daeseon Choi, "Mobile finger signature verification robust to skilled forgery," Journal of The Korea Institute of Information Security & Cryptology, 26(5), pp. 1161-1170, Oct. 2016.
DOI
|
11 |
L. Zhang, S. Tan, J. Yang, and Y. Chen, "Voicelive: a phoneme localization based liveness detection for voice authentication on smartphones," Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security, pp. 1080-1091. Oct. 2016.
|
12 |
D. Freeman, S. Jain, M. Durmuth, B. Biggio, and G. Giacinto, "Who are you? a statistical approach to measuring user authenticity," Proceedings of Network and Distributed System Security Symposium, pp. 1-15, Feb. 2016.
|
13 |
N.Z. Gong, M. Payer, R. Moazzezi, and M. Frank, "Forgery-resistant touchbased authentication on mobile devices," Proceedings of the 11th ACM on Asia Conference on Computer and Communications Security, pp. 499-510, May. 2016.
|
14 |
Minwoo Kim, Seungyeon Kim, and Taekyoung Kwon, " A study of behavior based authentication using touch dynamics and application usage on android," Journal of The Korea Institute of Information Security & Cryptology, 27(2), Apr. 2017.
|
15 |
D. Liu, B. Dong, X. Gao, and H. Wang, "Exploiting eye tracking for smartphone authentication," International Conference on Applied Cryptography and Network Security, Springer, pp. 457-477, Jun. 2015.
|
16 |
I. Sluganovic, M. Roeschlin, K.B. Rasmussen, and I. Martinovic, "Using reflexive eye movements for fast challenge-response authentication," Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security, pp. 1056-1067, Oct. 2016.
|
17 |
S. Eberz, K.B. Rasmussen, V. Lenders, and I. Martinovic, "Preventing lunchtime attacks: fighting insider threats with eye movement biometrics," Proceedings of Network and Distributed System Security Symposium, Feb. 2015.
|