File Download

There are no files associated with this item.

  Links for fulltext
     (May Require Subscription)
Supplementary

Conference Paper: Gesture authentication with touch input for mobile devices

TitleGesture authentication with touch input for mobile devices
Authors
Keywordsandroid
gestures
mobile authentication
security
Issue Date2012
Citation
Lecture Notes of the Institute for Computer Sciences, Social-Informatics and Telecommunications Engineering, 2012, v. 94 LNICST, p. 13-24 How to Cite?
AbstractThe convergence of our increasing reliance on mobile devices to access online services and the increasing number of online services bring to light usability and security problems in password entry. We propose using gestures with taps to the screen as an alternative to passwords. We test the recall and forgery of gesture authentication and show, using dynamic time warping, that even simple gestures are repeatable by their creators yet hard to forge by attackers when taps are added. © 2012 ICST Institute for Computer Science, Social Informatics and Telecommunications Engineering.
Persistent Identifierhttp://hdl.handle.net/10722/346576
ISSN
2023 SCImago Journal Rankings: 0.160

 

DC FieldValueLanguage
dc.contributor.authorNiu, Yuan-
dc.contributor.authorChen, Hao-
dc.date.accessioned2024-09-17T04:11:47Z-
dc.date.available2024-09-17T04:11:47Z-
dc.date.issued2012-
dc.identifier.citationLecture Notes of the Institute for Computer Sciences, Social-Informatics and Telecommunications Engineering, 2012, v. 94 LNICST, p. 13-24-
dc.identifier.issn1867-8211-
dc.identifier.urihttp://hdl.handle.net/10722/346576-
dc.description.abstractThe convergence of our increasing reliance on mobile devices to access online services and the increasing number of online services bring to light usability and security problems in password entry. We propose using gestures with taps to the screen as an alternative to passwords. We test the recall and forgery of gesture authentication and show, using dynamic time warping, that even simple gestures are repeatable by their creators yet hard to forge by attackers when taps are added. © 2012 ICST Institute for Computer Science, Social Informatics and Telecommunications Engineering.-
dc.languageeng-
dc.relation.ispartofLecture Notes of the Institute for Computer Sciences, Social-Informatics and Telecommunications Engineering-
dc.subjectandroid-
dc.subjectgestures-
dc.subjectmobile authentication-
dc.subjectsecurity-
dc.titleGesture authentication with touch input for mobile devices-
dc.typeConference_Paper-
dc.description.naturelink_to_subscribed_fulltext-
dc.identifier.doi10.1007/978-3-642-30244-2_2-
dc.identifier.scopuseid_2-s2.0-84869596824-
dc.identifier.volume94 LNICST-
dc.identifier.spage13-
dc.identifier.epage24-

Export via OAI-PMH Interface in XML Formats


OR


Export to Other Non-XML Formats