Cited By
View all- Vhaduri SDibbo SMuratyan ACheung W(2024)mWIoTAuth: Multi-wearable data-driven implicit IoT authenticationFuture Generation Computer Systems10.1016/j.future.2024.05.025159(230-242)Online publication date: Oct-2024
Due to the popularity of smartphones, there is a great need to deploy appropriate authentication mechanisms to safeguard users' sensitive data. Touch dynamics-based authentication has been developed to verify smartphone users and detect imposters. These ...
One of the main concerns during usage of the current smart mobile devices in public is the vulnerability of password hacking by shoulder-suffering or smudge attack. The traditional user authentication techniques such as PIN code or patterns-based ...
SPARSH explores a novel interaction method to seamlessly transfer data between digital devices in a fun and intuitive way. The user touches whatever data item he or she wants to copy from a device. At that moment, the data item is conceptually saved in ...
Association for Computing Machinery
New York, NY, United States
Check if you have access through your login credentials or your institution to get full access on this article.
Sign inView or Download as a PDF file.
PDFView online with eReader.
eReaderView this article in HTML Format.
HTML Format