Sign Up to like & get
recommendations!
0
Published in 2020 at "Wiley Interdisciplinary Reviews: Data Mining and Knowledge Discovery"
DOI: 10.1002/widm.1365
Abstract: The shortcomings of conventional access control systems for high‐security environments have led to the concert of continuous authentication. Contrary to traditional verification, in which users are authenticated only once at the start of their session,…
read more here.
Keywords:
biometrics advanced;
continuous authentication;
biometrics;
using biometrics ... See more keywords
Sign Up to like & get
recommendations!
0
Published in 2020 at "Journal of King Saud University - Computer and Information Sciences"
DOI: 10.1016/j.jksuci.2020.11.023
Abstract: Abstract Raising incidents of security threats among active sessions is an increasing concern in IoT environment. Continuous authentication was introducing to be superior to traditional authentication schemes by constantly verify users’ identities on an ongoing…
read more here.
Keywords:
continuous authentication;
iot continuous;
authentication;
cab iot ... See more keywords
Sign Up to like & get
recommendations!
1
Published in 2022 at "IEEE Internet of Things Journal"
DOI: 10.1109/jiot.2021.3108822
Abstract: With the widespread usage of mobile devices, the authentication mechanisms are urgently needed to identify users for information leakage prevention. In this article, we present CAGANet, a convolutional neural network (CNN)-based continuous authentication on smartphones…
read more here.
Keywords:
authentication;
network;
based continuous;
cnn based ... See more keywords
Sign Up to like & get
recommendations!
0
Published in 2017 at "IEEE Transactions on Computers"
DOI: 10.1109/tc.2016.2622262
Abstract: Most computer systems authenticate users only once at the time of initial login, which can lead to security concerns. Continuous authentication has been explored as an approach for alleviating such concerns. Previous methods for continuous…
read more here.
Keywords:
caba continuous;
based bioaura;
continuous authentication;
authentication ... See more keywords
Sign Up to like & get
recommendations!
1
Published in 2022 at "IEEE Transactions on Information Forensics and Security"
DOI: 10.1109/tifs.2022.3196270
Abstract: Currently, available contactless continuous authentication (CA) techniques depend on physiological biometrics to identify individuals at long intervals through complex feature extraction, resulting in poor accuracy, high computation costs, and security vacuums during lengthy intervals. To…
read more here.
Keywords:
authentication;
biometrics;
contactless continuous;
postural transition ... See more keywords