Author:
Rayani Praveen Kumar,Changder Suvamoy
Reference20 articles.
1. Alzubaidi, A., Kalita, J.: Authentication of smartphone users using behavioral biometrics. IEEE Commun. Surv. Tutor. 18(3), 1998–2026 (2016)
2. Aviv, A.J., Gibson, K., Mossop, E., Blaze, M., Smith, J.M.: Smudge attacks on smartphone touch screens. In: Proceedings of the 4th USENIX Conference on Offensive Technologies, pp. 1–10. USENIX Association, Berkeley, CA, USA (2010)
3. Biddle, R., Chiasson, S., Oorschot, P.V.: Graphical passwords. ACM Comput. Surv. 44(4), 1–41 (2012)
4. Conti, M., Zachia-Zlatea, I., Crispo, B.: Mind how you answer me! In: Proceedings of the 6th ACM Symposium on Information, Computer and Communications Security ASIACCS’11, pp. 249–259. ACM Press (2011)
5. Corcoran, P., Costache, C.: Biometric technology and smartphones: a consideration of the practicalities of a broad adoption of biometrics and the likely impacts. IEEE Consum. Electron. Mag. 5(2), 70–78 (2016)
Cited by
3 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献