Continuous Authentication Using Human-Induced Electric Potential
Abstract
References
Index Terms
- Continuous Authentication Using Human-Induced Electric Potential
Recommendations
Smart Kiosk with Gait-Based Continuous Authentication
Proceedings of the Third International Conference on Distributed, Ambient, and Pervasive Interactions - Volume 9189The authors propose to develop a smart kiosk that plays the role of an identity selector activated implicitly when a user is approaching that kiosk. The identity of a user is recognized implicitly in background by a mobile/wearable device based on his ...
Continuous and transparent multimodal authentication: reviewing the state of the art
Individuals, businesses and governments undertake an ever-growing range of activities online and via various Internet-enabled digital devices. Unfortunately, these activities, services, information and devices are the targets of cybercrimes. Verifying ...
Continuous Authentication Using Behavioral Biometrics
IWSPA '17: Proceedings of the 3rd ACM on International Workshop on Security And Privacy AnalyticsCurrently, the standard methods to authenticate a computer/network user typically occur once at the initial log-in. These authentication methods involve user proxies, especially passwords and smart cards such as common access cards (CACs) and service ID ...
Comments
Information & Contributors
Information
Published In
Publisher
Association for Computing Machinery
New York, NY, United States
Publication History
Check for updates
Author Tags
Qualifiers
- Research-article
- Research
- Refereed limited
Conference
Acceptance Rates
Contributors
Other Metrics
Bibliometrics & Citations
Bibliometrics
Article Metrics
- 0Total Citations
- 432Total Downloads
- Downloads (Last 12 months)432
- Downloads (Last 6 weeks)66
Other Metrics
Citations
View Options
View options
View or Download as a PDF file.
PDFeReader
View online with eReader.
eReaderHTML Format
View this article in HTML Format.
HTML FormatGet Access
Login options
Check if you have access through your login credentials or your institution to get full access on this article.
Sign in