REFERENCES
Abeni, P., Baltatu, M., and D’Alessandro, R. (2006). Nis03-
4: Implementing biometrics-based authentication for
mobile devices. In Global Telecommunications Con-
ference, 2006. GLOBECOM’06. IEEE, pages 1–5.
IEEE.
Aviv, A. J., Gibson, K. L., Mossop, E., Blaze, M., and
Smith, J. M. (2010). Smudge attacks on smartphone
touch screens. Woot, 10:1–7.
BenAbdelkader, C., Cutler, R., and Davis, L. (2002). Person
identification using automatic height and stride esti-
mation. In Pattern Recognition, 2002. Proceedings.
16th International Conference on, volume 4, pages
377–380. IEEE.
Bo, C., Zhang, L., Li, X.-Y., Huang, Q., and Wang, Y.
(2013). Silentsense: silent user identification via
touch and movement behavioral biometrics. In Pro-
ceedings of the 19th annual international conference
on Mobile computing & networking, pages 187–190.
ACM.
Buriro, A., Crispo, B., Delfrari, F., and Wrona, K. (2016).
Hold and sign: A novel behavioral biometrics for
smartphone user authentication. In Security and Pri-
vacy Workshops (SPW), 2016 IEEE, pages 276–285.
IEEE.
Canfora, G., Di Notte, P., Mercaldo, F., and Visaggio, C. A.
(2016). Silent and continuous authentication in mobile
environment. In SECRYPT.
Clarke, N. (2011). Transparent user authentication: bio-
metrics, RFID and behavioural profiling. Springer
Science & Business Media.
Clarke, N. L. and Furnell, S. M. (2005). Authentication of
users on mobile telephones–a survey of attitudes and
practices. Computers & Security, 24(7):519–527.
Crouse, D., Han, H., Chandra, D., Barbello, B., and Jain,
A. K. (2015). Continuous authentication of mobile
user: Fusion of face image and inertial measurement
unit data. In Biometrics (ICB), 2015 International
Conference on, pages 135–142. IEEE.
De Luca, A., Hang, A., Brudy, F., Lindner, C., and Huss-
mann, H. (2012). Touch me once and i know it’s you!:
implicit authentication based on touch screen patterns.
In Proceedings of the SIGCHI Conference on Human
Factors in Computing Systems, pages 987–996. ACM.
Derawi, M. O., Nickel, C., Bours, P., and Busch, C. (2010).
Unobtrusive user-authentication on mobile phones us-
ing biometric gait recognition. In Intelligent Informa-
tion Hiding and Multimedia Signal Processing (IIH-
MSP), 2010 Sixth International Conference on, pages
306–311. IEEE.
Fathy, M. E., Patel, V. M., and Chellappa, R. (2015). Face-
based active authentication on mobile devices. In
Acoustics, Speech and Signal Processing (ICASSP),
2015 IEEE International Conference on, pages 1687–
1691. IEEE.
Frank, M., Biedert, R., Ma, E., Martinovic, I., and Song, D.
(2013). Touchalytics: On the applicability of touch-
screen input as a behavioral biometric for continu-
ous authentication. IEEE transactions on information
forensics and security, 8(1):136–148.
Gafurov, D., Helkala, K., and Søndrol, T. (2006). Biometric
gait authentication using accelerometer sensor. JCP,
1(7):51–59.
Guidorizzi, R. P. (2013). Security: active authentication. IT
Professional, 15(4):4–7.
Hadid, A., Heikkila, J., Silv
´
en, O., and Pietikainen, M.
(2007). Face and eye detection for person authenti-
cation in mobile phones. In Distributed Smart Cam-
eras, 2007. ICDSC’07. First ACM/IEEE International
Conference on, pages 101–108. IEEE.
Harbach, M., Von Zezschwitz, E., Fichtner, A., De Luca,
A., and Smith, M. (2014). Itsa hard lock life: A field
study of smartphone (un) locking behavior and risk
perception. In Symposium on usable privacy and se-
curity (SOUPS), pages 213–230.
Jakobsson, M., Shi, E., Golle, P., and Chow, R. (2009). Im-
plicit authentication for mobile devices. In Proceed-
ings of the 4th USENIX conference on Hot topics in
security, pages 9–9. USENIX Association.
Kim, D.-J., Chung, K.-W., and Hong, K.-S. (2010). Per-
son authentication using face, teeth and voice modali-
ties for mobile device security. IEEE Transactions on
Consumer Electronics, 56(4).
Li, L., Zhao, X., and Xue, G. (2013). Unobservable re-
authentication for smartphones. In NDSS.
Mantyjarvi, J., Lindholm, M., Vildjiounaite, E., Makela,
S.-M., and Ailisto, H. (2005). Identifying users of
portable devices from gait pattern with accelerome-
ters. In Acoustics, Speech, and Signal Processing,
2005. Proceedings.(ICASSP’05). IEEE International
Conference on, volume 2, pages ii–973. IEEE.
Murmuria, R., Medsger, J., Stavrou, A., and Voas, J. M.
(2012). Mobile application and device power usage
measurements. In Software Security and Reliability
(SERE), 2012 IEEE Sixth International Conference
on, pages 147–156. IEEE.
Neal, T. J., Woodard, D. L., and Striegel, A. D. (2015). Mo-
bile device application, bluetooth, and wi-fi usage data
as behavioral biometric traits. In Biometrics Theory,
Applications and Systems (BTAS), 2015 IEEE 7th In-
ternational Conference on, pages 1–6. IEEE.
Patel, V. M., Chellappa, R., Chandra, D., and Barbello,
B. (2016). Continuous user authentication on mobile
devices: Recent progress and remaining challenges.
IEEE Signal Processing Magazine, 33(4):49–61.
Patel, V. M., Gopalan, R., Li, R., and Chellappa, R. (2015).
Visual domain adaptation: A survey of recent ad-
vances. IEEE signal processing magazine, 32(3):53–
69.
Saevanee, H. and Bhatarakosol, P. (2008). User authentica-
tion using combination of behavioral biometrics over
the touchpad acting like touch screen of mobile de-
vice. In Computer and Electrical Engineering, 2008.
ICCEE 2008. International Conference on, pages 82–
86. IEEE.
ˇ
Sed
ˇ
enka, J., Govindarajan, S., Gasti, P., and Balagani, K. S.
(2015). Secure outsourced biometric authentication
with performance evaluation on smartphones. IEEE
SECRYPT 2017 - 14th International Conference on Security and Cryptography
90