ceedings of the 2010 ACM workshop on Cloud com-
puting security workshop.
Clarke, N. (2011). Transparent User Authentication Bio-
metrics, RFID and Behavioural Profiling. Springer.
Das, S., Hayashi, E., and Hong, J. l. (2013). Exploring
capturable everyday memory for autobiographical au-
thentication. In Proceedings of the 2013 ACM inter-
national joint conference on UbiComp ’13.
Derawi, M. and Bours, P. (2013). Gait and activity recogni-
tion using commercial phones. Computers & Security.
Dierks, T. (2015). The Transport Layer Security (TLS) Pro-
tocol Version 1.2. RFC 5246.
Fridman, L., Weber, S., Greenstadt, R., and Kam, M.
(2015). Active authentication on mobile devices via
stylometry, application usage, web browsing, and gps
location. arXiv preprint arXiv:1503.08479.
Goh, A. and Ngo, D. (2003). Computation of cryptographic
keys from face biometrics. In Communications and
Multimedia Security, pages 1–13. LNCS 2828.
Google (2016). Google Abacus project.
http://www.androidcentral.com/project-abacus-
atap-project-aimed-killing-password. [Online;
accessed 10-July-2016].
Grosse, E. and Upadhyay, M. (2013). Authentication at
scale. Security & Privacy, IEEE, 11(1):15–22.
Guidorizzi, R. P. (2013). Security: Active authentication.
IT Professional, 15(4):4–7.
Hayashi, E., Das, S., Amini, S., Hong, J., and Oakley, I.
(2013). Casa: Context-aware scalable authentication.
In SOUPS ’13 Proceedings of the Ninth Symposium
on Usable Privacy and Security.
Jain, A. K., Ross, A., and Prabhakar, S. (2004). An intro-
duction to biometric recognition. Circuits and Systems
for Video Technology, IEEE Transactions on, 14(1):4–
20.
Jakobsson, M., Shi, E., Golle, P., and Chow, R. (2009).
Implicit authentication for mobile devices. In Hot-
Sec’09 Proceedings of the 4th USENIX conference on
Hot topics in security.
Kayacik, H. G., Just, M., Baillie, L., Aspinall, D., and Mi-
callef, N. (2014). Data driven authentication: On the
effectiveness of user behaviour modelling with mobile
device sensors. CoRR, abs/1410.7743.
Li, F., Clarke, N., Papadaki, M., and Dowland, P. (2013).
Active authentication for mobile devices utilising be-
haviour profiling. International Journal of Informa-
tion Security.
Mondal, S. and Bours, P. (2013). Continuous authentication
using mouse dynamics. In Biometrics Special Inter-
est Group (BIOSIG), 2013 International Conference
of the, pages 1–12. IEEE.
Nauman, M., Ali, T., and Rauf, A. (2013). Using trusted
computing for privacy preserving keystroke-based au-
thentication in smartphones. Telecommunication Sys-
tems, 52(4):2149–2161.
Patel, V. M., Chellappa, R., Chandra, D., and Barbello,
B. (2016). Continuous user authentication on mobile
devices: Recent progress and remaining challenges.
IEEE Signal Processing Magazine, 33(4):49–61.
Patel, V. M., Ratha, N. K., and Chellappa, R. (2015). Can-
celable biometrics: A review. IEEE Signal Processing
Magazine, 32(5):54–65.
Ratha, N., Connell, J., and Bolle, R. (2001). Enhancing se-
curity and privacy in biometrics-based authentication
system. IBM Systems J., 37(11):2245–2255.
Rathgeb, C. and Uhl, A. (2011). A survey on biometric
cryptosystems and cancelable biometrics. EURASIP
J. on Information Security, 3.
Saevanee, H., Clarke, N., Furnell, S., and Biscione, V.
(2014). Text-based active authentication for mobile
devices. In ICT Systems Security and Privacy Protec-
tion, pages 99–112. Springer.
Safa, N. A., Safavi-Naini, R., and Shahandashti, S. F.
(2014). Privacy-preserving implicit authentication. In
IFIP International Information Security Conference,
pages 471–484. Springer.
Sophos. Mobile usage. https://www.sophos.com/en-
us/press-office/press-releases/2013/03/mobile-
security-survey.aspx. [Online; accessed 10-July-
2016].
Tanviruzzaman, M. and Ahamed, S. I. (2014). Your phone
knows you: Almost transparent authentication for
smartphones. In Computer Software and Applica-
tions Conference (COMPSAC), 2014 IEEE 38th An-
nual, pages 374–383. IEEE.
Teoh, A., Ngo, D., and Goh, A. (2004). Biohashing: two
factor authentication featuring fingerprint data and to-
kenised random number. Pattern recognition, 40.
Vance, A. (2010). If your password is 123456, just make it
hackme.
Witte, H., Rathgeb, C., and Busch, C. (2013). Context-
aware mobile biometric authentication based on sup-
port vector machines. In Emerging Security Technolo-
gies (EST), 2013 Fourth International Conference on,
pages 29–32. IEEE.
Privacy Preserving Transparent Mobile Authentication
361