Buschek, D., De Luca, A., Alt, F.: Improving accuracy, applicability and usability of keystroke biometrics on mobile touchscreen devices. In: Conference on Human Factors in Computing Systems (CHI), pp. 1393–1402 (2015)
Google Scholar
Cherapau, I., Muslukhov, I., Asanka, N., Beznosov, K.: On the impact of touch ID on iPhone passcodes. In: Symposium on Usable Privacy and Security (SOUPS), pp. 257–276 (2015)
Google Scholar
Feng, T., Yang, J., Yan, Z., Tapia, E.M., Shi, W.: TIPS: context-aware implicit user identification using touch screen in uncontrolled environments. In: Proceedings of 15th Workshop on Mobile Computing Systems and Applications (HotMobile), p. 9 (2014)
Google Scholar
Frank, M., Biedert, R., Ma, E., Martinovic, I., Song, D.: Touchalytics: on the applicability of touchscreen input as a behavioral biometric for continuous authentication. Trans. Inf. Forensics Secur. (TIFS) 8(1), 136–148 (2013)
CrossRef
Google Scholar
Harbach, M., Von Zezschwitz, E., Fichtner, A., De Luca, A., Smith, M.: It’s a hard lock life: a field study of smartphone (un)locking behavior and risk perception. In: Symposium on Usable Privacy and Security (SOUPS), pp. 9–11 (2014)
Google Scholar
Khan, H., Hengartner, U.: Towards application-centric implicit authentication on smartphones. In: Workshop on Mobile Computing Systems and Applications (HotMobile), p. 10 (2014)
Google Scholar
Khan, H., Hengartner, U., Vogel, D.: Usability and security perceptions of implicit authentication: convenient, secure, sometimes annoying. In: Symposium on Usable Privacy and Security (SOUPS), pp. 225–239 (2015)
Google Scholar
Khan, H., Hengartner, U., Vogel, D.: Targeted mimicry attacks on touch input based implicit authentication schemes. In: International Conference on Mobile Systems, Applications, and Services (MobiSys), pp. 387–398 (2016)
Google Scholar
Krombholz, K., Hupperich, T., Holz, T.: Use the force: evaluating force-sensitive authentication for mobile devices. In: Symposium on Usable Privacy and Security (SOUPS), pp. 207–219 (2016)
Google Scholar
Security Research Labs: Fingerprints are Not Fit for Secure Device Unlocking (2014). https://srlabs.de/bites/spoofing-fingerprints/. Accessed 12/18/17
Lana’i Lookout: Phone Theft in American, Breaking Down the Phone Theft Epidemic (2014). https://transition.fcc.gov/cgb/events/Lookout-phone-theft-in-america.pdf. Accessed 18 Dec 2017
Murdock, A.: Consumers Spend More than 1 Billion Hours a Month Playing Mobile Games (2015). http://www.vertoanalytics.com/consumers-spend-1-billion-hours-month-playing-mobile-games. Accessed 18 Dec 2017
Neal, T.J., Woodard, D.L.: Surveying Biometric Authentication for Mobile Device Security. Journal of Pattern Recognition Research 1, 74–110 (2016)
CrossRef
Google Scholar
Ngyuen, T., Voris, J.: Touchscreen biometrics across multiple devices. In: Who are You?! Adventures in Authentication Workshop (WAY) Co-located with the Symposium on Usable Privacy and Security (SOUPS) (2017)
Google Scholar
Salem, M.B., Voris, J., Stolfo, S.: Decoy applications for continuous authentication on mobile devices. In: Who are You?! Adventures in Authentication Workshop (WAY) Co-located with the Symposium on Usable Privacy and Security (SOUPS) (2014)
Google Scholar
Schaub, F., Deyhle, R., Weber, M.: Password entry usability and shoulder surfing susceptibility on different smartphone platforms. In: Conference on Mobile and Ubiquitous Multimedia (MUM) (2012)
Google Scholar
Scindia, P., Voris, J.: Exploring games for improved touchscreen authentication on mobile devices. In: Who Are You?! Adventures in Authentication Workshop (WAY) Co-located with the Symposium on Usable Privacy and Security (SOUPS) (2016)
Google Scholar
Tapellini, D.: Smart Phone Thefts Rose to 3.1 Million in 2013 (2014). http://www.consumerreports.org/cro/news/2014/04/smart-phone-thefts-rose-to-3-1-million-last-year/index.htm. Accessed 18 Dec 2017
Welling, M.: Fisher linear discriminant analysis. Technical report, Department of Computer Science, University of Toronto (2005)
Google Scholar
Woollaston, V.: How Often Do You Check Your Phone? The Average Person Does It 110 Times a DAY (And up to Every 6 Seconds in the Evening) (2013). http://www.dailymail.co.uk/sciencetech/article-2449632/How-check-phone-The-average-person-does-110-times-DAY-6-seconds-evening.html. Accessed 18 Dec 2017
Xu, H., Zhou, Y., Lyu, M.R.: Towards continuous and passive authentication via touch biometrics: an experimental study on smartphones. In: Symposium on Usable Privacy and Security (SOUPS) (2014)
Google Scholar
Yan, J., Blackwell, A., Anderson, R., Grant, A.: Password memorability and security: empirical results. IEEE Secur. Privacy 2, 25–31 (2004)
CrossRef
Google Scholar