Apple Inc., iPhone 5s: Using the touch ID kb/HT5883 (2014),
http://support.apple.com/
(accessed: January 09, 2014)
Checkpoint, The impact of mobile devices on information security (2013),
http://www.checkpoint.com/downloads/products/check-point-mobile-security-survey-report2013.pdf
(accessed: January 05, 2014)
Clarke, N.: Transparent User Authentication. Springer, Berlin (2011)
CrossRef
Google Scholar
Clarke, N.L., Furnell, S.M.: Authentication of users on mobile telephones—a survey of attitudes and practices. Computer Security 24(7), 519–527 (2005)
CrossRef
Google Scholar
Clarke, N.L., Mekala, A.R.: The application of signature recognition to trans-parent handwriting verification for mobile devices. Information Management & Computer Security 15(3), 214–225 (2007)
CrossRef
Google Scholar
Clarke, N.L., Furnell, S.M.: Authenticating Mobile Phone Users Using Keystroke Analysis. International Journal of Information Security, 1–14 (2006) ISSN:1615-5262
Google Scholar
DARPA, Active Authentication, DARPA (2011),
http://www.darpa.mil/OurWork/I2O/Programs/Ac-tiveAuthentication.aspx
(accessed: January 17, 2014)
Derawi, M.O., Nickel, C., Bours, P., Busch, C.: Unobtrusive User-Authentication on Mobile Phones Using Biometric Gait Recognition. In: Sixth International Conference on Intelligent Information Hiding and Multimedia Signal Processing (2010)
Google Scholar
Eagle, N., Pentland, A., Lazer, D.: Inferring social network structure using mobile phone data. Proceedings of the National Academy of Sciences (PNAS) 106, 15274–15278 (2009)
CrossRef
Google Scholar
FaceLock (2014),
http://www.facelock.mobi/
(date accessed: January 08, 2014)
Gartner, Gartner Says Mobile App Stores Will See Annual Downloads Reach 102 Billion in 2013 (2013),
http://www.gartner.com/newsroom/id/2592315
(accessed: October 10, 2014)
Huth, A., Orlando, M., Pesante, L.: Password Security, Protection, and Management (2012),
https://www.uscert.gov/sites/default/files/publications/PasswordMgmt2012.pdf
(accessed: January 09, 2014)
IDC, Android Pushes Past 80% Market Share While Windows Phone Shipments Leap 156.0% Year Over Year in the Third Quarter (2013),
http://www.idc.com/getdoc.jsp?con-tainerId=prUS24442013
(accessed: January 23, 2014)
ITU, Global ICT developments (2014),
http://www.itu.int/en/ITUD/Statistics/Pages/stat/default.aspx
(accessed: January 06, 2014)
Kurkovsky, S., Syta, E.: Digital natives and mobile phones: A survey of practices and attitudes about privacy and security. In: Proceedings of the IEEE International Symposium on Technology and Society (ISTAS), pp. 441–449 (2010)
Google Scholar
Lazou, A., Weir, G.: Perceived risk and sensitive data on mobile devices. Cyberforensics. University of Strathclyde, Glasgow, pp. 183–196 (2011) ISBN 9780947649784
Google Scholar
Li, F., Clarke, N.L., Papadaki, M., Dowland, P.S.: Active authentication for mobile devices utilising behaviour profiling. International Journal of Information Security (2013), doi:10.1007/s10207-013-0209-6
Google Scholar
Portioresearch, Fast growth of apps user base in booming Asia Pacific market (2013),
http://www.portioresearch.com/en/blog/2013/fast-growth-of-apps-user-base-in-booming-asia-pacific-market.aspx
(accessed January 10, 2014)
Prabhakar, S., Pankanti, S., Jain, A.K.: Biometric recognition: security and privacy concerns. IEEE Security & Privacy 1(2), 33–42 (2003)
CrossRef
Google Scholar
Weinstein, E., Ho, P., Heisele, B., Poggio, T., Steele, K., Agarwal, A.: Handheld face identification technology in a pervasive computing environment. In: Pervasive 2002, Zurich, Switzerland, pp. 48–54 (2002)
Google Scholar
Woo, R., Park, A., Hazen, T.: The MIT Mobile Device Speaker Verification Corpus: Data collection and preliminary experiments. In: Proceeding of Odyssey, The Speaker & Language Recognition Workshop, San Juan, Puerto Rico (June 2006)
Google Scholar