Filters








2 Hits in 1.8 sec

SocialAuth: Designing Touch Behavioral Smartphone User Authentication Based on Social Networking Applications [chapter]

Weizhi Meng, Wenjuan Li, Lijun Jiang, Jianying Zhou
2019 IFIP Advances in Information and Communication Technology  
In this work, we focus on social networking applications and design a touch behavioral authentication scheme called SocialAuth.  ...  Due to the limitations of traditional authentication methods like Personal Identification Number (PIN), research has been moved to the design of touch behavioral authentication on smartphones.  ...  We would like to thank all anonymous reviewers for their helpful comments, and Jianying Zhou was supported by SUTD start-up research grant SRG-ISTD-2017-124.  ... 
doi:10.1007/978-3-030-22312-0_13 fatcat:bkxhjxle5javhk4afabuorgnka

A Comprehensive Survey on Machine Learning Techniques and User Authentication Approaches for Credit Card Fraud Detection [article]

Niloofar Yousefi, Marie Alaghband, Ivan Garibay
2019 arXiv   pre-print
These models typically rely on some static physical characteristics, such as what the user knows (knowledge-based method), or what he/she has access to (object-based method).  ...  As a result, financial organizations are working hard on developing and deploying credit card fraud detection methods, in order to adapt to ever-evolving, increasingly sophisticated defrauding strategies  ...  Due to this behavioral biometric, they develop a new touch movement-based user authentication scheme that authenticate users by combining users' touch movements and Android unlock patterns called TMGuard  ... 
arXiv:1912.02629v1 fatcat:cnedguwpkveydnlbmdljm65t24