A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2021; you can also visit the original URL.
The file type is
IFIP Advances in Information and Communication Technology
In this work, we focus on social networking applications and design a touch behavioral authentication scheme called SocialAuth. ... Due to the limitations of traditional authentication methods like Personal Identification Number (PIN), research has been moved to the design of touch behavioral authentication on smartphones. ... We would like to thank all anonymous reviewers for their helpful comments, and Jianying Zhou was supported by SUTD start-up research grant SRG-ISTD-2017-124. ...doi:10.1007/978-3-030-22312-0_13 fatcat:bkxhjxle5javhk4afabuorgnka
These models typically rely on some static physical characteristics, such as what the user knows (knowledge-based method), or what he/she has access to (object-based method). ... As a result, financial organizations are working hard on developing and deploying credit card fraud detection methods, in order to adapt to ever-evolving, increasingly sophisticated defrauding strategies ... Due to this behavioral biometric, they develop a new touch movement-based user authentication scheme that authenticate users by combining users' touch movements and Android unlock patterns called TMGuard ...arXiv:1912.02629v1 fatcat:cnedguwpkveydnlbmdljm65t24