Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 233,120,599 papers from all fields of science
Search
Sign In
Create Free Account
Implicit authentication
Known as:
Implicit Authentication (IA)
Implicit authentication (IA) is a technique that allows the smart device to recognize its owner by being acquainted with his/her behaviors. It is a…
Expand
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
8 relations
K-nearest neighbors algorithm
Kullback–Leibler divergence
Machine learning
Sandbox (computer security)
Expand
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
2018
2018
Implicit authentication protocol and self-healing key management for WBANs
Jian Shen
,
Shaohua Chang
,
Qi Liu
,
Jun Shen
,
Yongjun Ren
Multimedia tools and applications
2018
Corpus ID: 13666926
In recent years, the rapid development of computer science and technology brings health care into the information era. As a…
Expand
2017
2017
A coherent authentication framework for mobile computing based on homomorphic signature and implicit authentication
H. Mohammed
,
S. Fati
,
V. Ponnusamy
,
B. Ooi
,
Robithoh Annur
,
S. Liew
2017
Corpus ID: 6306840
Mobile cloud computing is an extension of cloud computing that allow the users to access the cloud service via their mobile…
Expand
Review
2016
Review
2016
Evaluating the Efficacy of Implicit Authentication Under Realistic Operating Scenarios
Hassan Khan
2016
Corpus ID: 13238308
Smartphones contain a wealth of personal and corporate data. Several surveys have reported that about half of the smartphone…
Expand
2015
2015
One Time Password Generation for Multifactor Authentication using Graphical Password
Nilesh B. Khankari
,
P. G. Kale
2015
Corpus ID: 212483650
— Single factor authentication such as password authentication is no longer considered as secure in the Internet world. There is…
Expand
2015
2015
Implicit Authentication System for Smartphones Users Based on Touch Data
Reham Amin
,
T. Gaber
,
G. Eltaweel
European Control Conference
2015
Corpus ID: 1907524
Currently smartphone’ users run many crucial applications (such as banking and emails) which contains a very confidential…
Expand
2012
2012
Arm's Flex when Responding Call for Implicit User Authentication in Smartphone
Ali Fahmi
,
Perwira Negara
,
+4 authors
S. Sayeed
2012
Corpus ID: 18084763
From using secret knowledge like password up to physical traits as biometrics, current smartphone authentication systems are…
Expand
2011
2011
Implicit Authentication On Mobile Devices
T. Stockinger
2011
Corpus ID: 54048800
One major disadvantage of mobile devices is their liability to theft. Since people make more intense use of their smart phones to…
Expand
2011
2011
Toward Pairing-Free Certificateless Authenticated Key Exchanges
H. Xiong
,
Qianhong Wu
,
Zhong Chen
Information Security Conference
2011
Corpus ID: 3436166
Certificateless authenticated key exchange (CL-AKE) protocols do not suffer from intricate certificate management or heavy trust…
Expand
2010
2010
Two-party and three-party remote user authentication schemes using biometric data only for emergency
Chin-Feng Lee
,
Shin-Ruei Huang
,
Hung-Yu Chien
,
N. Lee
2nd International Symposium on Aware Computing
2010
Corpus ID: 12940098
Passwords and smart cards have been widely utilized to remotely authenticate users for system security and users' convenience…
Expand
2006
2006
Highly Reliable Synchronous Stream Cipher System for Link Encryption
Hoon-Jae Lee
Communication Systems and Applications
2006
Corpus ID: 46458088
A highly reliable synchronous stream cipher system with absolute synchronization is proposed. The proposed system includes an…
Expand
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
(opens in a new tab)
,
Terms of Service
(opens in a new tab)
, and
Dataset License
(opens in a new tab)
ACCEPT & CONTINUE