Toward supervised shape-based behavioral authentication on smartphones
Currently, smartphone security has received much more attention as users may use their devices to perform various sensitive tasks. For example, users can utilize mobile banking applications for online shopping, which may store many sensitive data on their devices. Hence there is a need to authentica...
Ausführliche Beschreibung
Autor*in: |
Li, Wenjuan [verfasserIn] |
---|
Format: |
E-Artikel |
---|---|
Sprache: |
Englisch |
Erschienen: |
2020transfer abstract |
---|
Schlagwörter: |
---|
Übergeordnetes Werk: |
Enthalten in: Models of agglomerate growth in fluidized bed reactors: Critical review, status and applications - Khadilkar, Aditi ELSEVIER, 2014, Amsterdam [u.a.] |
---|---|
Übergeordnetes Werk: |
volume:55 ; year:2020 ; pages:0 |
Links: |
---|
DOI / URN: |
10.1016/j.jisa.2020.102591 |
---|
Katalog-ID: |
ELV052435431 |
---|
LEADER | 01000caa a22002652 4500 | ||
---|---|---|---|
001 | ELV052435431 | ||
003 | DE-627 | ||
005 | 20230626033257.0 | ||
007 | cr uuu---uuuuu | ||
008 | 210910s2020 xx |||||o 00| ||eng c | ||
024 | 7 | |a 10.1016/j.jisa.2020.102591 |2 doi | |
028 | 5 | 2 | |a /cbs_pica/cbs_olc/import_discovery/elsevier/einzuspielen/GBV00000000001231.pica |
035 | |a (DE-627)ELV052435431 | ||
035 | |a (ELSEVIER)S2214-2126(20)30758-4 | ||
040 | |a DE-627 |b ger |c DE-627 |e rakwb | ||
041 | |a eng | ||
082 | 0 | 4 | |a 660 |q VZ |
082 | 0 | 4 | |a 630 |a 640 |a 580 |q VZ |
084 | |a BIODIV |q DE-30 |2 fid | ||
084 | |a 42.00 |2 bkl | ||
100 | 1 | |a Li, Wenjuan |e verfasserin |4 aut | |
245 | 1 | 0 | |a Toward supervised shape-based behavioral authentication on smartphones |
264 | 1 | |c 2020transfer abstract | |
336 | |a nicht spezifiziert |b zzz |2 rdacontent | ||
337 | |a nicht spezifiziert |b z |2 rdamedia | ||
338 | |a nicht spezifiziert |b zu |2 rdacarrier | ||
520 | |a Currently, smartphone security has received much more attention as users may use their devices to perform various sensitive tasks. For example, users can utilize mobile banking applications for online shopping, which may store many sensitive data on their devices. Hence there is a need to authenticate users and detect imposters. However, traditional textual passwords are easily compromised and are not convenient for users to remember for a long time due to long-term memory limitation. To complement textual passwords, behavioral authentication is developed by authenticating a user based on the relevant biometric features. In this work, we focus on simple shape-based behavioral authentication that requires users to draw shape(s) for authentication, and investigate how to design such kind of behavioral authentication in practice. We consider two research questions: (1) whether the authentication accuracy varies with different shapes, and (2) how many shapes can be used to achieve good usability. In the evaluation, we perform two user studies with 60 participants and measure some typical supervised learning classifiers. Based on the results, we provide insights on designing a supervised shape-based behavioral authentication system, as compared with similar schemes. | ||
520 | |a Currently, smartphone security has received much more attention as users may use their devices to perform various sensitive tasks. For example, users can utilize mobile banking applications for online shopping, which may store many sensitive data on their devices. Hence there is a need to authenticate users and detect imposters. However, traditional textual passwords are easily compromised and are not convenient for users to remember for a long time due to long-term memory limitation. To complement textual passwords, behavioral authentication is developed by authenticating a user based on the relevant biometric features. In this work, we focus on simple shape-based behavioral authentication that requires users to draw shape(s) for authentication, and investigate how to design such kind of behavioral authentication in practice. We consider two research questions: (1) whether the authentication accuracy varies with different shapes, and (2) how many shapes can be used to achieve good usability. In the evaluation, we perform two user studies with 60 participants and measure some typical supervised learning classifiers. Based on the results, we provide insights on designing a supervised shape-based behavioral authentication system, as compared with similar schemes. | ||
650 | 7 | |a User authentication |2 Elsevier | |
650 | 7 | |a Behavioral biometric |2 Elsevier | |
650 | 7 | |a Shape-based authentication |2 Elsevier | |
650 | 7 | |a Supervised learning |2 Elsevier | |
650 | 7 | |a Touch dynamics |2 Elsevier | |
700 | 1 | |a Wang, Yu |4 oth | |
700 | 1 | |a Li, Jin |4 oth | |
700 | 1 | |a Xiang, Yang |4 oth | |
773 | 0 | 8 | |i Enthalten in |n Elsevier |a Khadilkar, Aditi ELSEVIER |t Models of agglomerate growth in fluidized bed reactors: Critical review, status and applications |d 2014 |g Amsterdam [u.a.] |w (DE-627)ELV028549872 |
773 | 1 | 8 | |g volume:55 |g year:2020 |g pages:0 |
856 | 4 | 0 | |u https://doi.org/10.1016/j.jisa.2020.102591 |3 Volltext |
912 | |a GBV_USEFLAG_U | ||
912 | |a GBV_ELV | ||
912 | |a SYSFLAG_U | ||
912 | |a FID-BIODIV | ||
912 | |a GBV_ILN_99 | ||
912 | |a GBV_ILN_165 | ||
936 | b | k | |a 42.00 |j Biologie: Allgemeines |q VZ |
951 | |a AR | ||
952 | |d 55 |j 2020 |h 0 |
author_variant |
w l wl |
---|---|
matchkey_str |
liwenjuanwangyulijinxiangyang:2020----:oaduevsdhpbsdeairluhni |
hierarchy_sort_str |
2020transfer abstract |
bklnumber |
42.00 |
publishDate |
2020 |
allfields |
10.1016/j.jisa.2020.102591 doi /cbs_pica/cbs_olc/import_discovery/elsevier/einzuspielen/GBV00000000001231.pica (DE-627)ELV052435431 (ELSEVIER)S2214-2126(20)30758-4 DE-627 ger DE-627 rakwb eng 660 VZ 630 640 580 VZ BIODIV DE-30 fid 42.00 bkl Li, Wenjuan verfasserin aut Toward supervised shape-based behavioral authentication on smartphones 2020transfer abstract nicht spezifiziert zzz rdacontent nicht spezifiziert z rdamedia nicht spezifiziert zu rdacarrier Currently, smartphone security has received much more attention as users may use their devices to perform various sensitive tasks. For example, users can utilize mobile banking applications for online shopping, which may store many sensitive data on their devices. Hence there is a need to authenticate users and detect imposters. However, traditional textual passwords are easily compromised and are not convenient for users to remember for a long time due to long-term memory limitation. To complement textual passwords, behavioral authentication is developed by authenticating a user based on the relevant biometric features. In this work, we focus on simple shape-based behavioral authentication that requires users to draw shape(s) for authentication, and investigate how to design such kind of behavioral authentication in practice. We consider two research questions: (1) whether the authentication accuracy varies with different shapes, and (2) how many shapes can be used to achieve good usability. In the evaluation, we perform two user studies with 60 participants and measure some typical supervised learning classifiers. Based on the results, we provide insights on designing a supervised shape-based behavioral authentication system, as compared with similar schemes. Currently, smartphone security has received much more attention as users may use their devices to perform various sensitive tasks. For example, users can utilize mobile banking applications for online shopping, which may store many sensitive data on their devices. Hence there is a need to authenticate users and detect imposters. However, traditional textual passwords are easily compromised and are not convenient for users to remember for a long time due to long-term memory limitation. To complement textual passwords, behavioral authentication is developed by authenticating a user based on the relevant biometric features. In this work, we focus on simple shape-based behavioral authentication that requires users to draw shape(s) for authentication, and investigate how to design such kind of behavioral authentication in practice. We consider two research questions: (1) whether the authentication accuracy varies with different shapes, and (2) how many shapes can be used to achieve good usability. In the evaluation, we perform two user studies with 60 participants and measure some typical supervised learning classifiers. Based on the results, we provide insights on designing a supervised shape-based behavioral authentication system, as compared with similar schemes. User authentication Elsevier Behavioral biometric Elsevier Shape-based authentication Elsevier Supervised learning Elsevier Touch dynamics Elsevier Wang, Yu oth Li, Jin oth Xiang, Yang oth Enthalten in Elsevier Khadilkar, Aditi ELSEVIER Models of agglomerate growth in fluidized bed reactors: Critical review, status and applications 2014 Amsterdam [u.a.] (DE-627)ELV028549872 volume:55 year:2020 pages:0 https://doi.org/10.1016/j.jisa.2020.102591 Volltext GBV_USEFLAG_U GBV_ELV SYSFLAG_U FID-BIODIV GBV_ILN_99 GBV_ILN_165 42.00 Biologie: Allgemeines VZ AR 55 2020 0 |
spelling |
10.1016/j.jisa.2020.102591 doi /cbs_pica/cbs_olc/import_discovery/elsevier/einzuspielen/GBV00000000001231.pica (DE-627)ELV052435431 (ELSEVIER)S2214-2126(20)30758-4 DE-627 ger DE-627 rakwb eng 660 VZ 630 640 580 VZ BIODIV DE-30 fid 42.00 bkl Li, Wenjuan verfasserin aut Toward supervised shape-based behavioral authentication on smartphones 2020transfer abstract nicht spezifiziert zzz rdacontent nicht spezifiziert z rdamedia nicht spezifiziert zu rdacarrier Currently, smartphone security has received much more attention as users may use their devices to perform various sensitive tasks. For example, users can utilize mobile banking applications for online shopping, which may store many sensitive data on their devices. Hence there is a need to authenticate users and detect imposters. However, traditional textual passwords are easily compromised and are not convenient for users to remember for a long time due to long-term memory limitation. To complement textual passwords, behavioral authentication is developed by authenticating a user based on the relevant biometric features. In this work, we focus on simple shape-based behavioral authentication that requires users to draw shape(s) for authentication, and investigate how to design such kind of behavioral authentication in practice. We consider two research questions: (1) whether the authentication accuracy varies with different shapes, and (2) how many shapes can be used to achieve good usability. In the evaluation, we perform two user studies with 60 participants and measure some typical supervised learning classifiers. Based on the results, we provide insights on designing a supervised shape-based behavioral authentication system, as compared with similar schemes. Currently, smartphone security has received much more attention as users may use their devices to perform various sensitive tasks. For example, users can utilize mobile banking applications for online shopping, which may store many sensitive data on their devices. Hence there is a need to authenticate users and detect imposters. However, traditional textual passwords are easily compromised and are not convenient for users to remember for a long time due to long-term memory limitation. To complement textual passwords, behavioral authentication is developed by authenticating a user based on the relevant biometric features. In this work, we focus on simple shape-based behavioral authentication that requires users to draw shape(s) for authentication, and investigate how to design such kind of behavioral authentication in practice. We consider two research questions: (1) whether the authentication accuracy varies with different shapes, and (2) how many shapes can be used to achieve good usability. In the evaluation, we perform two user studies with 60 participants and measure some typical supervised learning classifiers. Based on the results, we provide insights on designing a supervised shape-based behavioral authentication system, as compared with similar schemes. User authentication Elsevier Behavioral biometric Elsevier Shape-based authentication Elsevier Supervised learning Elsevier Touch dynamics Elsevier Wang, Yu oth Li, Jin oth Xiang, Yang oth Enthalten in Elsevier Khadilkar, Aditi ELSEVIER Models of agglomerate growth in fluidized bed reactors: Critical review, status and applications 2014 Amsterdam [u.a.] (DE-627)ELV028549872 volume:55 year:2020 pages:0 https://doi.org/10.1016/j.jisa.2020.102591 Volltext GBV_USEFLAG_U GBV_ELV SYSFLAG_U FID-BIODIV GBV_ILN_99 GBV_ILN_165 42.00 Biologie: Allgemeines VZ AR 55 2020 0 |
allfields_unstemmed |
10.1016/j.jisa.2020.102591 doi /cbs_pica/cbs_olc/import_discovery/elsevier/einzuspielen/GBV00000000001231.pica (DE-627)ELV052435431 (ELSEVIER)S2214-2126(20)30758-4 DE-627 ger DE-627 rakwb eng 660 VZ 630 640 580 VZ BIODIV DE-30 fid 42.00 bkl Li, Wenjuan verfasserin aut Toward supervised shape-based behavioral authentication on smartphones 2020transfer abstract nicht spezifiziert zzz rdacontent nicht spezifiziert z rdamedia nicht spezifiziert zu rdacarrier Currently, smartphone security has received much more attention as users may use their devices to perform various sensitive tasks. For example, users can utilize mobile banking applications for online shopping, which may store many sensitive data on their devices. Hence there is a need to authenticate users and detect imposters. However, traditional textual passwords are easily compromised and are not convenient for users to remember for a long time due to long-term memory limitation. To complement textual passwords, behavioral authentication is developed by authenticating a user based on the relevant biometric features. In this work, we focus on simple shape-based behavioral authentication that requires users to draw shape(s) for authentication, and investigate how to design such kind of behavioral authentication in practice. We consider two research questions: (1) whether the authentication accuracy varies with different shapes, and (2) how many shapes can be used to achieve good usability. In the evaluation, we perform two user studies with 60 participants and measure some typical supervised learning classifiers. Based on the results, we provide insights on designing a supervised shape-based behavioral authentication system, as compared with similar schemes. Currently, smartphone security has received much more attention as users may use their devices to perform various sensitive tasks. For example, users can utilize mobile banking applications for online shopping, which may store many sensitive data on their devices. Hence there is a need to authenticate users and detect imposters. However, traditional textual passwords are easily compromised and are not convenient for users to remember for a long time due to long-term memory limitation. To complement textual passwords, behavioral authentication is developed by authenticating a user based on the relevant biometric features. In this work, we focus on simple shape-based behavioral authentication that requires users to draw shape(s) for authentication, and investigate how to design such kind of behavioral authentication in practice. We consider two research questions: (1) whether the authentication accuracy varies with different shapes, and (2) how many shapes can be used to achieve good usability. In the evaluation, we perform two user studies with 60 participants and measure some typical supervised learning classifiers. Based on the results, we provide insights on designing a supervised shape-based behavioral authentication system, as compared with similar schemes. User authentication Elsevier Behavioral biometric Elsevier Shape-based authentication Elsevier Supervised learning Elsevier Touch dynamics Elsevier Wang, Yu oth Li, Jin oth Xiang, Yang oth Enthalten in Elsevier Khadilkar, Aditi ELSEVIER Models of agglomerate growth in fluidized bed reactors: Critical review, status and applications 2014 Amsterdam [u.a.] (DE-627)ELV028549872 volume:55 year:2020 pages:0 https://doi.org/10.1016/j.jisa.2020.102591 Volltext GBV_USEFLAG_U GBV_ELV SYSFLAG_U FID-BIODIV GBV_ILN_99 GBV_ILN_165 42.00 Biologie: Allgemeines VZ AR 55 2020 0 |
allfieldsGer |
10.1016/j.jisa.2020.102591 doi /cbs_pica/cbs_olc/import_discovery/elsevier/einzuspielen/GBV00000000001231.pica (DE-627)ELV052435431 (ELSEVIER)S2214-2126(20)30758-4 DE-627 ger DE-627 rakwb eng 660 VZ 630 640 580 VZ BIODIV DE-30 fid 42.00 bkl Li, Wenjuan verfasserin aut Toward supervised shape-based behavioral authentication on smartphones 2020transfer abstract nicht spezifiziert zzz rdacontent nicht spezifiziert z rdamedia nicht spezifiziert zu rdacarrier Currently, smartphone security has received much more attention as users may use their devices to perform various sensitive tasks. For example, users can utilize mobile banking applications for online shopping, which may store many sensitive data on their devices. Hence there is a need to authenticate users and detect imposters. However, traditional textual passwords are easily compromised and are not convenient for users to remember for a long time due to long-term memory limitation. To complement textual passwords, behavioral authentication is developed by authenticating a user based on the relevant biometric features. In this work, we focus on simple shape-based behavioral authentication that requires users to draw shape(s) for authentication, and investigate how to design such kind of behavioral authentication in practice. We consider two research questions: (1) whether the authentication accuracy varies with different shapes, and (2) how many shapes can be used to achieve good usability. In the evaluation, we perform two user studies with 60 participants and measure some typical supervised learning classifiers. Based on the results, we provide insights on designing a supervised shape-based behavioral authentication system, as compared with similar schemes. Currently, smartphone security has received much more attention as users may use their devices to perform various sensitive tasks. For example, users can utilize mobile banking applications for online shopping, which may store many sensitive data on their devices. Hence there is a need to authenticate users and detect imposters. However, traditional textual passwords are easily compromised and are not convenient for users to remember for a long time due to long-term memory limitation. To complement textual passwords, behavioral authentication is developed by authenticating a user based on the relevant biometric features. In this work, we focus on simple shape-based behavioral authentication that requires users to draw shape(s) for authentication, and investigate how to design such kind of behavioral authentication in practice. We consider two research questions: (1) whether the authentication accuracy varies with different shapes, and (2) how many shapes can be used to achieve good usability. In the evaluation, we perform two user studies with 60 participants and measure some typical supervised learning classifiers. Based on the results, we provide insights on designing a supervised shape-based behavioral authentication system, as compared with similar schemes. User authentication Elsevier Behavioral biometric Elsevier Shape-based authentication Elsevier Supervised learning Elsevier Touch dynamics Elsevier Wang, Yu oth Li, Jin oth Xiang, Yang oth Enthalten in Elsevier Khadilkar, Aditi ELSEVIER Models of agglomerate growth in fluidized bed reactors: Critical review, status and applications 2014 Amsterdam [u.a.] (DE-627)ELV028549872 volume:55 year:2020 pages:0 https://doi.org/10.1016/j.jisa.2020.102591 Volltext GBV_USEFLAG_U GBV_ELV SYSFLAG_U FID-BIODIV GBV_ILN_99 GBV_ILN_165 42.00 Biologie: Allgemeines VZ AR 55 2020 0 |
allfieldsSound |
10.1016/j.jisa.2020.102591 doi /cbs_pica/cbs_olc/import_discovery/elsevier/einzuspielen/GBV00000000001231.pica (DE-627)ELV052435431 (ELSEVIER)S2214-2126(20)30758-4 DE-627 ger DE-627 rakwb eng 660 VZ 630 640 580 VZ BIODIV DE-30 fid 42.00 bkl Li, Wenjuan verfasserin aut Toward supervised shape-based behavioral authentication on smartphones 2020transfer abstract nicht spezifiziert zzz rdacontent nicht spezifiziert z rdamedia nicht spezifiziert zu rdacarrier Currently, smartphone security has received much more attention as users may use their devices to perform various sensitive tasks. For example, users can utilize mobile banking applications for online shopping, which may store many sensitive data on their devices. Hence there is a need to authenticate users and detect imposters. However, traditional textual passwords are easily compromised and are not convenient for users to remember for a long time due to long-term memory limitation. To complement textual passwords, behavioral authentication is developed by authenticating a user based on the relevant biometric features. In this work, we focus on simple shape-based behavioral authentication that requires users to draw shape(s) for authentication, and investigate how to design such kind of behavioral authentication in practice. We consider two research questions: (1) whether the authentication accuracy varies with different shapes, and (2) how many shapes can be used to achieve good usability. In the evaluation, we perform two user studies with 60 participants and measure some typical supervised learning classifiers. Based on the results, we provide insights on designing a supervised shape-based behavioral authentication system, as compared with similar schemes. Currently, smartphone security has received much more attention as users may use their devices to perform various sensitive tasks. For example, users can utilize mobile banking applications for online shopping, which may store many sensitive data on their devices. Hence there is a need to authenticate users and detect imposters. However, traditional textual passwords are easily compromised and are not convenient for users to remember for a long time due to long-term memory limitation. To complement textual passwords, behavioral authentication is developed by authenticating a user based on the relevant biometric features. In this work, we focus on simple shape-based behavioral authentication that requires users to draw shape(s) for authentication, and investigate how to design such kind of behavioral authentication in practice. We consider two research questions: (1) whether the authentication accuracy varies with different shapes, and (2) how many shapes can be used to achieve good usability. In the evaluation, we perform two user studies with 60 participants and measure some typical supervised learning classifiers. Based on the results, we provide insights on designing a supervised shape-based behavioral authentication system, as compared with similar schemes. User authentication Elsevier Behavioral biometric Elsevier Shape-based authentication Elsevier Supervised learning Elsevier Touch dynamics Elsevier Wang, Yu oth Li, Jin oth Xiang, Yang oth Enthalten in Elsevier Khadilkar, Aditi ELSEVIER Models of agglomerate growth in fluidized bed reactors: Critical review, status and applications 2014 Amsterdam [u.a.] (DE-627)ELV028549872 volume:55 year:2020 pages:0 https://doi.org/10.1016/j.jisa.2020.102591 Volltext GBV_USEFLAG_U GBV_ELV SYSFLAG_U FID-BIODIV GBV_ILN_99 GBV_ILN_165 42.00 Biologie: Allgemeines VZ AR 55 2020 0 |
language |
English |
source |
Enthalten in Models of agglomerate growth in fluidized bed reactors: Critical review, status and applications Amsterdam [u.a.] volume:55 year:2020 pages:0 |
sourceStr |
Enthalten in Models of agglomerate growth in fluidized bed reactors: Critical review, status and applications Amsterdam [u.a.] volume:55 year:2020 pages:0 |
format_phy_str_mv |
Article |
bklname |
Biologie: Allgemeines |
institution |
findex.gbv.de |
topic_facet |
User authentication Behavioral biometric Shape-based authentication Supervised learning Touch dynamics |
dewey-raw |
660 |
isfreeaccess_bool |
false |
container_title |
Models of agglomerate growth in fluidized bed reactors: Critical review, status and applications |
authorswithroles_txt_mv |
Li, Wenjuan @@aut@@ Wang, Yu @@oth@@ Li, Jin @@oth@@ Xiang, Yang @@oth@@ |
publishDateDaySort_date |
2020-01-01T00:00:00Z |
hierarchy_top_id |
ELV028549872 |
dewey-sort |
3660 |
id |
ELV052435431 |
language_de |
englisch |
fullrecord |
<?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>01000caa a22002652 4500</leader><controlfield tag="001">ELV052435431</controlfield><controlfield tag="003">DE-627</controlfield><controlfield tag="005">20230626033257.0</controlfield><controlfield tag="007">cr uuu---uuuuu</controlfield><controlfield tag="008">210910s2020 xx |||||o 00| ||eng c</controlfield><datafield tag="024" ind1="7" ind2=" "><subfield code="a">10.1016/j.jisa.2020.102591</subfield><subfield code="2">doi</subfield></datafield><datafield tag="028" ind1="5" ind2="2"><subfield code="a">/cbs_pica/cbs_olc/import_discovery/elsevier/einzuspielen/GBV00000000001231.pica</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-627)ELV052435431</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(ELSEVIER)S2214-2126(20)30758-4</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-627</subfield><subfield code="b">ger</subfield><subfield code="c">DE-627</subfield><subfield code="e">rakwb</subfield></datafield><datafield tag="041" ind1=" " ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="082" ind1="0" ind2="4"><subfield code="a">660</subfield><subfield code="q">VZ</subfield></datafield><datafield tag="082" ind1="0" ind2="4"><subfield code="a">630</subfield><subfield code="a">640</subfield><subfield code="a">580</subfield><subfield code="q">VZ</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">BIODIV</subfield><subfield code="q">DE-30</subfield><subfield code="2">fid</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">42.00</subfield><subfield code="2">bkl</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Li, Wenjuan</subfield><subfield code="e">verfasserin</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Toward supervised shape-based behavioral authentication on smartphones</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="c">2020transfer abstract</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="a">nicht spezifiziert</subfield><subfield code="b">zzz</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="a">nicht spezifiziert</subfield><subfield code="b">z</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="a">nicht spezifiziert</subfield><subfield code="b">zu</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="520" ind1=" " ind2=" "><subfield code="a">Currently, smartphone security has received much more attention as users may use their devices to perform various sensitive tasks. For example, users can utilize mobile banking applications for online shopping, which may store many sensitive data on their devices. Hence there is a need to authenticate users and detect imposters. However, traditional textual passwords are easily compromised and are not convenient for users to remember for a long time due to long-term memory limitation. To complement textual passwords, behavioral authentication is developed by authenticating a user based on the relevant biometric features. In this work, we focus on simple shape-based behavioral authentication that requires users to draw shape(s) for authentication, and investigate how to design such kind of behavioral authentication in practice. We consider two research questions: (1) whether the authentication accuracy varies with different shapes, and (2) how many shapes can be used to achieve good usability. In the evaluation, we perform two user studies with 60 participants and measure some typical supervised learning classifiers. Based on the results, we provide insights on designing a supervised shape-based behavioral authentication system, as compared with similar schemes.</subfield></datafield><datafield tag="520" ind1=" " ind2=" "><subfield code="a">Currently, smartphone security has received much more attention as users may use their devices to perform various sensitive tasks. For example, users can utilize mobile banking applications for online shopping, which may store many sensitive data on their devices. Hence there is a need to authenticate users and detect imposters. However, traditional textual passwords are easily compromised and are not convenient for users to remember for a long time due to long-term memory limitation. To complement textual passwords, behavioral authentication is developed by authenticating a user based on the relevant biometric features. In this work, we focus on simple shape-based behavioral authentication that requires users to draw shape(s) for authentication, and investigate how to design such kind of behavioral authentication in practice. We consider two research questions: (1) whether the authentication accuracy varies with different shapes, and (2) how many shapes can be used to achieve good usability. In the evaluation, we perform two user studies with 60 participants and measure some typical supervised learning classifiers. Based on the results, we provide insights on designing a supervised shape-based behavioral authentication system, as compared with similar schemes.</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">User authentication</subfield><subfield code="2">Elsevier</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Behavioral biometric</subfield><subfield code="2">Elsevier</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Shape-based authentication</subfield><subfield code="2">Elsevier</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Supervised learning</subfield><subfield code="2">Elsevier</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Touch dynamics</subfield><subfield code="2">Elsevier</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Wang, Yu</subfield><subfield code="4">oth</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Li, Jin</subfield><subfield code="4">oth</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Xiang, Yang</subfield><subfield code="4">oth</subfield></datafield><datafield tag="773" ind1="0" ind2="8"><subfield code="i">Enthalten in</subfield><subfield code="n">Elsevier</subfield><subfield code="a">Khadilkar, Aditi ELSEVIER</subfield><subfield code="t">Models of agglomerate growth in fluidized bed reactors: Critical review, status and applications</subfield><subfield code="d">2014</subfield><subfield code="g">Amsterdam [u.a.]</subfield><subfield code="w">(DE-627)ELV028549872</subfield></datafield><datafield tag="773" ind1="1" ind2="8"><subfield code="g">volume:55</subfield><subfield code="g">year:2020</subfield><subfield code="g">pages:0</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="u">https://doi.org/10.1016/j.jisa.2020.102591</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_USEFLAG_U</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ELV</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">SYSFLAG_U</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">FID-BIODIV</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_99</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_165</subfield></datafield><datafield tag="936" ind1="b" ind2="k"><subfield code="a">42.00</subfield><subfield code="j">Biologie: Allgemeines</subfield><subfield code="q">VZ</subfield></datafield><datafield tag="951" ind1=" " ind2=" "><subfield code="a">AR</subfield></datafield><datafield tag="952" ind1=" " ind2=" "><subfield code="d">55</subfield><subfield code="j">2020</subfield><subfield code="h">0</subfield></datafield></record></collection>
|
author |
Li, Wenjuan |
spellingShingle |
Li, Wenjuan ddc 660 ddc 630 fid BIODIV bkl 42.00 Elsevier User authentication Elsevier Behavioral biometric Elsevier Shape-based authentication Elsevier Supervised learning Elsevier Touch dynamics Toward supervised shape-based behavioral authentication on smartphones |
authorStr |
Li, Wenjuan |
ppnlink_with_tag_str_mv |
@@773@@(DE-627)ELV028549872 |
format |
electronic Article |
dewey-ones |
660 - Chemical engineering 630 - Agriculture & related technologies 640 - Home & family management 580 - Plants (Botany) |
delete_txt_mv |
keep |
author_role |
aut |
collection |
elsevier |
remote_str |
true |
illustrated |
Not Illustrated |
topic_title |
660 VZ 630 640 580 VZ BIODIV DE-30 fid 42.00 bkl Toward supervised shape-based behavioral authentication on smartphones User authentication Elsevier Behavioral biometric Elsevier Shape-based authentication Elsevier Supervised learning Elsevier Touch dynamics Elsevier |
topic |
ddc 660 ddc 630 fid BIODIV bkl 42.00 Elsevier User authentication Elsevier Behavioral biometric Elsevier Shape-based authentication Elsevier Supervised learning Elsevier Touch dynamics |
topic_unstemmed |
ddc 660 ddc 630 fid BIODIV bkl 42.00 Elsevier User authentication Elsevier Behavioral biometric Elsevier Shape-based authentication Elsevier Supervised learning Elsevier Touch dynamics |
topic_browse |
ddc 660 ddc 630 fid BIODIV bkl 42.00 Elsevier User authentication Elsevier Behavioral biometric Elsevier Shape-based authentication Elsevier Supervised learning Elsevier Touch dynamics |
format_facet |
Elektronische Aufsätze Aufsätze Elektronische Ressource |
format_main_str_mv |
Text Zeitschrift/Artikel |
carriertype_str_mv |
zu |
author2_variant |
y w yw j l jl y x yx |
hierarchy_parent_title |
Models of agglomerate growth in fluidized bed reactors: Critical review, status and applications |
hierarchy_parent_id |
ELV028549872 |
dewey-tens |
660 - Chemical engineering 630 - Agriculture 640 - Home & family management 580 - Plants (Botany) |
hierarchy_top_title |
Models of agglomerate growth in fluidized bed reactors: Critical review, status and applications |
isfreeaccess_txt |
false |
familylinks_str_mv |
(DE-627)ELV028549872 |
title |
Toward supervised shape-based behavioral authentication on smartphones |
ctrlnum |
(DE-627)ELV052435431 (ELSEVIER)S2214-2126(20)30758-4 |
title_full |
Toward supervised shape-based behavioral authentication on smartphones |
author_sort |
Li, Wenjuan |
journal |
Models of agglomerate growth in fluidized bed reactors: Critical review, status and applications |
journalStr |
Models of agglomerate growth in fluidized bed reactors: Critical review, status and applications |
lang_code |
eng |
isOA_bool |
false |
dewey-hundreds |
600 - Technology 500 - Science |
recordtype |
marc |
publishDateSort |
2020 |
contenttype_str_mv |
zzz |
container_start_page |
0 |
author_browse |
Li, Wenjuan |
container_volume |
55 |
class |
660 VZ 630 640 580 VZ BIODIV DE-30 fid 42.00 bkl |
format_se |
Elektronische Aufsätze |
author-letter |
Li, Wenjuan |
doi_str_mv |
10.1016/j.jisa.2020.102591 |
dewey-full |
660 630 640 580 |
title_sort |
toward supervised shape-based behavioral authentication on smartphones |
title_auth |
Toward supervised shape-based behavioral authentication on smartphones |
abstract |
Currently, smartphone security has received much more attention as users may use their devices to perform various sensitive tasks. For example, users can utilize mobile banking applications for online shopping, which may store many sensitive data on their devices. Hence there is a need to authenticate users and detect imposters. However, traditional textual passwords are easily compromised and are not convenient for users to remember for a long time due to long-term memory limitation. To complement textual passwords, behavioral authentication is developed by authenticating a user based on the relevant biometric features. In this work, we focus on simple shape-based behavioral authentication that requires users to draw shape(s) for authentication, and investigate how to design such kind of behavioral authentication in practice. We consider two research questions: (1) whether the authentication accuracy varies with different shapes, and (2) how many shapes can be used to achieve good usability. In the evaluation, we perform two user studies with 60 participants and measure some typical supervised learning classifiers. Based on the results, we provide insights on designing a supervised shape-based behavioral authentication system, as compared with similar schemes. |
abstractGer |
Currently, smartphone security has received much more attention as users may use their devices to perform various sensitive tasks. For example, users can utilize mobile banking applications for online shopping, which may store many sensitive data on their devices. Hence there is a need to authenticate users and detect imposters. However, traditional textual passwords are easily compromised and are not convenient for users to remember for a long time due to long-term memory limitation. To complement textual passwords, behavioral authentication is developed by authenticating a user based on the relevant biometric features. In this work, we focus on simple shape-based behavioral authentication that requires users to draw shape(s) for authentication, and investigate how to design such kind of behavioral authentication in practice. We consider two research questions: (1) whether the authentication accuracy varies with different shapes, and (2) how many shapes can be used to achieve good usability. In the evaluation, we perform two user studies with 60 participants and measure some typical supervised learning classifiers. Based on the results, we provide insights on designing a supervised shape-based behavioral authentication system, as compared with similar schemes. |
abstract_unstemmed |
Currently, smartphone security has received much more attention as users may use their devices to perform various sensitive tasks. For example, users can utilize mobile banking applications for online shopping, which may store many sensitive data on their devices. Hence there is a need to authenticate users and detect imposters. However, traditional textual passwords are easily compromised and are not convenient for users to remember for a long time due to long-term memory limitation. To complement textual passwords, behavioral authentication is developed by authenticating a user based on the relevant biometric features. In this work, we focus on simple shape-based behavioral authentication that requires users to draw shape(s) for authentication, and investigate how to design such kind of behavioral authentication in practice. We consider two research questions: (1) whether the authentication accuracy varies with different shapes, and (2) how many shapes can be used to achieve good usability. In the evaluation, we perform two user studies with 60 participants and measure some typical supervised learning classifiers. Based on the results, we provide insights on designing a supervised shape-based behavioral authentication system, as compared with similar schemes. |
collection_details |
GBV_USEFLAG_U GBV_ELV SYSFLAG_U FID-BIODIV GBV_ILN_99 GBV_ILN_165 |
title_short |
Toward supervised shape-based behavioral authentication on smartphones |
url |
https://doi.org/10.1016/j.jisa.2020.102591 |
remote_bool |
true |
author2 |
Wang, Yu Li, Jin Xiang, Yang |
author2Str |
Wang, Yu Li, Jin Xiang, Yang |
ppnlink |
ELV028549872 |
mediatype_str_mv |
z |
isOA_txt |
false |
hochschulschrift_bool |
false |
author2_role |
oth oth oth |
doi_str |
10.1016/j.jisa.2020.102591 |
up_date |
2024-07-06T23:01:10.430Z |
_version_ |
1803872496969056256 |
fullrecord_marcxml |
<?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>01000caa a22002652 4500</leader><controlfield tag="001">ELV052435431</controlfield><controlfield tag="003">DE-627</controlfield><controlfield tag="005">20230626033257.0</controlfield><controlfield tag="007">cr uuu---uuuuu</controlfield><controlfield tag="008">210910s2020 xx |||||o 00| ||eng c</controlfield><datafield tag="024" ind1="7" ind2=" "><subfield code="a">10.1016/j.jisa.2020.102591</subfield><subfield code="2">doi</subfield></datafield><datafield tag="028" ind1="5" ind2="2"><subfield code="a">/cbs_pica/cbs_olc/import_discovery/elsevier/einzuspielen/GBV00000000001231.pica</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-627)ELV052435431</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(ELSEVIER)S2214-2126(20)30758-4</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-627</subfield><subfield code="b">ger</subfield><subfield code="c">DE-627</subfield><subfield code="e">rakwb</subfield></datafield><datafield tag="041" ind1=" " ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="082" ind1="0" ind2="4"><subfield code="a">660</subfield><subfield code="q">VZ</subfield></datafield><datafield tag="082" ind1="0" ind2="4"><subfield code="a">630</subfield><subfield code="a">640</subfield><subfield code="a">580</subfield><subfield code="q">VZ</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">BIODIV</subfield><subfield code="q">DE-30</subfield><subfield code="2">fid</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">42.00</subfield><subfield code="2">bkl</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Li, Wenjuan</subfield><subfield code="e">verfasserin</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Toward supervised shape-based behavioral authentication on smartphones</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="c">2020transfer abstract</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="a">nicht spezifiziert</subfield><subfield code="b">zzz</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="a">nicht spezifiziert</subfield><subfield code="b">z</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="a">nicht spezifiziert</subfield><subfield code="b">zu</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="520" ind1=" " ind2=" "><subfield code="a">Currently, smartphone security has received much more attention as users may use their devices to perform various sensitive tasks. For example, users can utilize mobile banking applications for online shopping, which may store many sensitive data on their devices. Hence there is a need to authenticate users and detect imposters. However, traditional textual passwords are easily compromised and are not convenient for users to remember for a long time due to long-term memory limitation. To complement textual passwords, behavioral authentication is developed by authenticating a user based on the relevant biometric features. In this work, we focus on simple shape-based behavioral authentication that requires users to draw shape(s) for authentication, and investigate how to design such kind of behavioral authentication in practice. We consider two research questions: (1) whether the authentication accuracy varies with different shapes, and (2) how many shapes can be used to achieve good usability. In the evaluation, we perform two user studies with 60 participants and measure some typical supervised learning classifiers. Based on the results, we provide insights on designing a supervised shape-based behavioral authentication system, as compared with similar schemes.</subfield></datafield><datafield tag="520" ind1=" " ind2=" "><subfield code="a">Currently, smartphone security has received much more attention as users may use their devices to perform various sensitive tasks. For example, users can utilize mobile banking applications for online shopping, which may store many sensitive data on their devices. Hence there is a need to authenticate users and detect imposters. However, traditional textual passwords are easily compromised and are not convenient for users to remember for a long time due to long-term memory limitation. To complement textual passwords, behavioral authentication is developed by authenticating a user based on the relevant biometric features. In this work, we focus on simple shape-based behavioral authentication that requires users to draw shape(s) for authentication, and investigate how to design such kind of behavioral authentication in practice. We consider two research questions: (1) whether the authentication accuracy varies with different shapes, and (2) how many shapes can be used to achieve good usability. In the evaluation, we perform two user studies with 60 participants and measure some typical supervised learning classifiers. Based on the results, we provide insights on designing a supervised shape-based behavioral authentication system, as compared with similar schemes.</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">User authentication</subfield><subfield code="2">Elsevier</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Behavioral biometric</subfield><subfield code="2">Elsevier</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Shape-based authentication</subfield><subfield code="2">Elsevier</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Supervised learning</subfield><subfield code="2">Elsevier</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Touch dynamics</subfield><subfield code="2">Elsevier</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Wang, Yu</subfield><subfield code="4">oth</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Li, Jin</subfield><subfield code="4">oth</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Xiang, Yang</subfield><subfield code="4">oth</subfield></datafield><datafield tag="773" ind1="0" ind2="8"><subfield code="i">Enthalten in</subfield><subfield code="n">Elsevier</subfield><subfield code="a">Khadilkar, Aditi ELSEVIER</subfield><subfield code="t">Models of agglomerate growth in fluidized bed reactors: Critical review, status and applications</subfield><subfield code="d">2014</subfield><subfield code="g">Amsterdam [u.a.]</subfield><subfield code="w">(DE-627)ELV028549872</subfield></datafield><datafield tag="773" ind1="1" ind2="8"><subfield code="g">volume:55</subfield><subfield code="g">year:2020</subfield><subfield code="g">pages:0</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="u">https://doi.org/10.1016/j.jisa.2020.102591</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_USEFLAG_U</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ELV</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">SYSFLAG_U</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">FID-BIODIV</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_99</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_165</subfield></datafield><datafield tag="936" ind1="b" ind2="k"><subfield code="a">42.00</subfield><subfield code="j">Biologie: Allgemeines</subfield><subfield code="q">VZ</subfield></datafield><datafield tag="951" ind1=" " ind2=" "><subfield code="a">AR</subfield></datafield><datafield tag="952" ind1=" " ind2=" "><subfield code="d">55</subfield><subfield code="j">2020</subfield><subfield code="h">0</subfield></datafield></record></collection>
|
score |
7.397687 |