Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 228,394,742 papers from all fields of science
Search
Sign In
Create Free Account
Implicit authentication
Known as:
Implicit Authentication (IA)
Implicit authentication (IA) is a technique that allows the smart device to recognize its owner by being acquainted with his/her behaviors. It is a…
Expand
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
8 relations
K-nearest neighbors algorithm
Kullback–Leibler divergence
Machine learning
Sandbox (computer security)
Expand
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
2018
2018
Implicit authentication protocol and self-healing key management for WBANs
Jian Shen
,
Shaohua Chang
,
Qi Liu
,
Jun Shen
,
Yongjun Ren
Multimedia tools and applications
2018
Corpus ID: 13666926
In recent years, the rapid development of computer science and technology brings health care into the information era. As a…
Expand
2018
2018
A CAPTCHA-like implicit authentication model for smart TV based on machine learning algorithms
Jinhyung Kim
,
Gihoon Park
,
Jaeook Kwon
,
Eun-Ae Cho
IEEE International Conference on Consumer…
2018
Corpus ID: 4626173
Recently, IoT (Internet of Things) environment centered Smart TV has been developed exponentially to provide a convenient and…
Expand
2015
2015
Implicit Authentication for Smartphone Security
Wei-Han Lee
,
R. Lee
International Conference on Information Systems…
2015
Corpus ID: 14737031
Common authentication methods based on passwords, or fingerprints in smartphones, depend on user participation. They do not…
Expand
2015
2015
One Time Password Generation for Multifactor Authentication using Graphical Password
Nilesh B. Khankari
,
P. G. Kale
2015
Corpus ID: 212483650
— Single factor authentication such as password authentication is no longer considered as secure in the Internet world. There is…
Expand
2015
2015
Implicit Authentication System for Smartphones Users Based on Touch Data
Reham Amin
,
T. Gaber
,
G. Eltaweel
European Control Conference
2015
Corpus ID: 1907524
Currently smartphone’ users run many crucial applications (such as banking and emails) which contains a very confidential…
Expand
2011
2011
Toward Pairing-Free Certificateless Authenticated Key Exchanges
H. Xiong
,
Qianhong Wu
,
Zhong Chen
Information Security Conference
2011
Corpus ID: 3436166
Certificateless authenticated key exchange (CL-AKE) protocols do not suffer from intricate certificate management or heavy trust…
Expand
2010
2010
Two-party and three-party remote user authentication schemes using biometric data only for emergency
Chin-Feng Lee
,
Shin-Ruei Huang
,
Hung-Yu Chien
,
N. Lee
2nd International Symposium on Aware Computing
2010
Corpus ID: 12940098
Passwords and smart cards have been widely utilized to remotely authenticate users for system security and users' convenience…
Expand
2008
2008
Towards a secure mutual authentication and key exchange protocol for mobile communications
Y. He
,
Moon-Chuen Lee
6th International Symposium on Modeling and…
2008
Corpus ID: 6781617
We analyze several mutual authentication and key exchange protocols (MAKEPs), and present a number of essential properties of the…
Expand
2007
2007
A DoS and fault-tolerant authentication protocol for group communications in ad hoc networks
Yixin Jiang
,
Chuang Lin
,
Minghui Shi
,
Xuemin Shen
,
Xiaowen Chu
Computer Communications
2007
Corpus ID: 16208872
2006
2006
Highly Reliable Synchronous Stream Cipher System for Link Encryption
Hoon-Jae Lee
Communication Systems and Applications
2006
Corpus ID: 46458088
A highly reliable synchronous stream cipher system with absolute synchronization is proposed. The proposed system includes an…
Expand
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
(opens in a new tab)
,
Terms of Service
(opens in a new tab)
, and
Dataset License
(opens in a new tab)
ACCEPT & CONTINUE