Evaluating the Efficacy of Implicit Authentication Under Realistic Operating Scenarios

@inproceedings{Khan2016EvaluatingTE,
  title={Evaluating the Efficacy of Implicit Authentication Under Realistic Operating Scenarios},
  author={Hassan Khan},
  year={2016}
}
Smartphones contain a wealth of personal and corporate data. Several surveys have reported that about half of the smartphone owners do not configure primary authentication mechanisms (such as PINs, passwords, and fingerprintor facial-recognition systems) on their devices to protect data due to usability concerns. In addition, primary authentication… CONTINUE READING