References
- N. Clarke, S. Furnell, P. Rodwell, and P. Reynolds, "Acceptance of Subscriber Authentication Methods For Mobile Telephony Device," Computer & Security, Vol. 21, No. 3, pp. 220-228, June 2002. https://doi.org/10.1016/S0167-4048(02)00304-8
- H. Zhang, C. Yan, P. Zhao, and M. Wang, "Model construction and authentication algorithm of virtual keystroke dynamics for smart phone users," 2016 IEEE International Conference on Systems, Man, and Cybernetics, pp. 000171-000175, October 2016.
- M. Trojahn, and F. Ortmeier, "Toward mobile authentiction with keystroke dynamics on mobile phones and tablets," 27th International Conference on Advanced Information Networking and Applications Workshops, pp. 697-702, 2013.
- K. D. Rajat, M. Sudipta, and B. Puranjoy, "User Authentication Based on Keystroke Dynamics," IETE Journal of Research, Vol. 60, No. 3, pp. 229-239, July 2014. https://doi.org/10.1080/03772063.2014.914686
- S. Hwang, S. Cho, and S. Park, "Mobile User Authentication using Keystroke Dynamics Analysis," Conference Korea Operations Research And Management Society, pp. 652-655, Nov. 2006.
- T. Shari, S. Cal, and K. Larry et al., "Biometric authentication on a mobile device: a study of user effort, error and task disruption," Proceedings of the 28th Annual Computer Security Applications Conference, pp. 159-168, 2012.
- J. S. A-Falconi, H. A. Osman and A. E. Saddik, "ECG Authentication for Mobile Devices," IEEE Transactions on Instrumentation and Measurement, Vol. 65, Issue. 3, pp. 591-600, 2016. https://doi.org/10.1109/TIM.2015.2503863
- Y. Zheng and Z. Sihui, "A Usable Authentication System Based on Personal Voice Challenge," Proceeding of 2016 International Conference on Advanced Cloud and Big Data, pp. 194-199, Aug. 2016.
- T. Ko, T. Shon, and M. Hong, "A Study on the Korean-Stroke based Graphical Password Approach," Journal of the Korea Institute of Information Security & Cryptology, Vol. 22, No. 2, pp. 189-200, April 2012.
- W. Hu, X. Wu, and G. Wei, "The security analysis of graphical passwords," Proceedings of 2010 International Conference on Communications and Intelligence Information Security, pp. 200-203, Oct. 2010.
- H. Gao, Z. Ren, X. Chang, X. Liu, and U. Aickelin, "A new graphical password scheme resistanct to shoulder-surfing," Proceedings of International Conference on Cyberworlds, pp. 194-199, Oct. 2010.
- L. Ballard, D. Lopresti, and F. Monrose, "Evaluating the Security of Handwriting Biometrics," Proceedings of 10th International Workshop on Frontiers in Handwriting Recognition, pp. 461-466, Oct. 2006.
- A. Buriro, B. Crispo, F. Delfrari, and K. Wrona, "Hold and Sign: A Novel Behavioral Biometrics for Smartphone User Authentication," Proceedings of 2016 IEEE Security and Privacy Workshops, pp. 276-285, May 2016.