Bo, C., Zhang, L., Jung, T., Han, J., Li, X.-Y., and Wang,
Y. (2014). Continuous user identification via touch
and movement behavioral biometrics. In Perfor-
mance Computing and Communications Conference
(IPCCC), 2014 IEEE International, pages 1–8. IEEE.
Brocardo, M. L. and Traore, I. (2014). Continuous authen-
tication using micro-messages. In Privacy, Security
and Trust (PST), 2014, pages 179–188. IEEE.
Brown, M. and Rogers, S. J. (1993). User identification via
keystroke characteristics of typed names using neu-
ral networks. International Journal of Man-Machine
Studies, 39(6):999–1014.
Clarke, N. and Mekala, A. (2006). Transparent handwriting
verification for mobile devices. In Proceedings of the
Sixth International Network Conference (INC 2006),
Plymouth, UK, pages 11–14. Citeseer.
Davis, D., Monrose, F., and Reiter, M. K. (2004). On user
choice in graphical password schemes. In USENIX
Security Symposium, volume 13, pages 11–11.
De Luca, A., Hang, A., Brudy, F., Lindner, C., and Huss-
mann, H. (2012). Touch me once and i know it’s you!:
implicit authentication based on touch screen patterns.
In Proceedings of the SIGCHI, pages 987–996. ACM.
Dhamija, R. and Perrig, A. (2000). D ej a vu: A user study
using images for authentication.
Dunphy, P., Heiner, A. P., and Asokan, N. (2010). A closer
look at recognition-based graphical passwords on mo-
bile devices. In Proceedings of the Sixth Symposium
on Usable Privacy and Security, page 3. ACM.
Frank, M., Biedert, R., Ma, E.-D., Martinovic, I., and
Song, D. (2013). Touchalytics: On the applicabil-
ity of touchscreen input as a behavioral biometric for
continuous authentication. Information Forensics and
Security, IEEE Transactions on, 8(1):136–148.
Gamboa, H. and Fred, A. (2004). A behavioral biometric
system based on human-computer interaction. In De-
fense and Security, pages 381–392. International So-
ciety for Optics and Photonics.
Gascon, H., Uellenbeck, S., Wolf, C., and Rieck, K. (2014).
Continuous authentication on mobile devices by anal-
ysis of typing motion behavior. In Sicherheit, pages
1–12.
Joyce, R. and Gupta, G. (1990). Identity authentication
based on keystroke latencies. Communications of the
ACM, 33(2):168–176.
Killourhy, K. S. and Maxion, R. A. (2009). Compar-
ing anomaly-detection algorithms for keystroke dy-
namics. In Dependable Systems & Networks, 2009.
DSN’09. IEEE/IFIP International Conference on,
pages 125–134. IEEE.
Koreman, J., Morris, A., Wu, D., Jassim, S., Sellahewa,
H., Ehlers, J., Chollet, G., Aversano, G., Bredin, H.,
Garcia-Salicetti, S., et al. (2006). Multi-modal bio-
metric authentication on the securephone pda. In Pro-
ceedings of the MMUA workshop on Multimodal User
Authentication.
Kotropoulos, C. and Samaras, S. (2014). Mobile phone
identification using recorded speech signals. In Digi-
tal Signal Processing (DSP), 2014 19th International
Conference on, pages 586–591. IEEE.
Kwapisz, J. R., Weiss, G. M., and Moore, S. A. (2010).
Cell phone-based biometric identification. In Biomet-
rics: Theory Applications and Systems (BTAS), 2010
Fourth IEEE International Conference on, pages 1–7.
IEEE.
Monrose, F. and Rubin, A. (1997). Authentication via
keystroke dynamics. In Proceedings of the 4th ACM
conference on Computer and communications secu-
rity, pages 48–56. ACM.
Murmuria, R., Stavrou, A., Barbar
´
a, D., and Fleck, D.
(2015). Continuous authentication on mobile devices
using power consumption, touch gestures and physical
movement of users. In Research in Attacks, Intrusions,
and Defenses, pages 405–424. Springer.
Nicholson, A. J., Corner, M. D., and Noble, B. D. (2006).
Mobile device security using transient authentica-
tion. Mobile Computing, IEEE Transactions on,
5(11):1489–1502.
Piuri, V. and Scotti, F. (2008). Fingerprint biometrics via
low-cost sensors and webcams. In Biometrics: The-
ory, Applications and Systems, 2008. BTAS 2008. 2nd
IEEE International Conference on, pages 1–6. IEEE.
Riva, O., Qin, C., Strauss, K., and Lymberopoulos, D.
(2012). Progressive authentication: deciding when to
authenticate on mobile phones. In Presented as part
of the 21st USENIX Security Symposium (USENIX Se-
curity 12), pages 301–316.
Sae-Bae, N. and Memon, N. (2013). A simple and effective
method for online signature verification. In BIOSIG,
pages 1–12. IEEE.
Seo, H., Kim, E., and Kim, H. K. (2012). A novel biometric
identification based on a users input pattern analysis
for intelligent mobile devices. International Journal
of Advanced Robotic Systems, 9:1–10.
Shen, C., Cai, Z., Guan, X., and Cai, J. (2010). A hypo-
optimum feature selection strategy for mouse dynam-
ics in continuous identity authentication and monitor-
ing. In Information Theory and Information Secu-
rity (ICITIS), 2010 IEEE International Conference on,
pages 349–353. IEEE.
Shepherd, S. (1995). Continuous authentication by anal-
ysis of keyboard typing characteristics. In Security
and Detection, 1995., European Convention on, pages
111–114. IET.
Wu, J.-S., Lin, W.-C., Lin, C.-T., and Wei, T.-E.
(2015). Smartphone continuous authentication based
on keystroke and gesture profiling. In Security Tech-
nology (ICCST), 2015 International Carnahan Con-
ference on, pages 191–197. IEEE.
Zheng, N., Bai, K., Huang, H., and Wang, H. (2014).
You are how you touch: User verification on smart-
phones via tapping behaviors. In ICNP, pages 221–
232. IEEE.
SECRYPT 2016 - International Conference on Security and Cryptography
108