ScienceGate
Advanced Search
Author Search
Journal Finder
Blog
Sign in / Sign up
ScienceGate
Search
Author Search
Journal Finder
Blog
Sign in / Sign up
On the Applicability of Multi-Characteristics for the Continuous Authentication in IIoT Scenarios
Mapping Intimacies
◽
10.1109/nana53684.2021.00041
◽
2021
◽
Author(s):
Guozhu Zhao
◽
Pinchang Zhang
◽
Lisheng Ma
Keyword(s):
Continuous Authentication
Download Full-text
Related Documents
Cited By
References
DAKOTA: Sensor and Touch Screen-Based Continuous Authentication on a Mobile Banking Application
IEEE Access
◽
10.1109/access.2021.3063424
◽
2021
◽
Vol 9
◽
pp. 38943-38960
Author(s):
Ozlem Durmaz Incel
◽
Secil Gunay
◽
Yasemin Akan
◽
Yunus Barlas
◽
Okan Engin Basar
◽
...
Keyword(s):
Touch Screen
◽
Mobile Banking
◽
Continuous Authentication
Download Full-text
Task-Based Continuous Authentication Using Wrist-Worn Devices
2021 IEEE International Conference on Pervasive Computing and Communications Workshops and other Affiliated Events (PerCom Workshops)
◽
10.1109/percomworkshops51409.2021.9430864
◽
2021
◽
Author(s):
Zaire Ali
◽
Jamie Payton
Keyword(s):
Continuous Authentication
Download Full-text
Lightweight Continuous Authentication via Intelligently Arranged Pseudo-Random Access in 5G-and-Beyond
IEEE Transactions on Communications
◽
10.1109/tcomm.2021.3065980
◽
2021
◽
pp. 1-1
Author(s):
He Fang
◽
Xianbin Wang
◽
Nan Zhao
◽
Naofal Al-Dhahir
Keyword(s):
Random Access
◽
Continuous Authentication
Download Full-text
Architecture for Continuous Authentication in Location-Based Services
2020 International Conference on Innovation and Intelligence for Informatics, Computing and Technologies (3ICT)
◽
10.1109/3ict51146.2020.9311972
◽
2020
◽
Author(s):
Hosam Alamleh
◽
Ali Abdullah S. AlQahtani
Keyword(s):
Location Based Services
◽
Continuous Authentication
Download Full-text
AuthCODE: A Privacy-preserving and Multi-device Continuous Authentication Architecture based on Machine and Deep Learning
Computers & Security
◽
10.1016/j.cose.2020.102168
◽
2021
◽
pp. 102168
Author(s):
Pedro Miguel Sánchez Sánchez
◽
Lorenzo Fernández Maimó
◽
Alberto Huertas Celdrán
◽
Gregorio Martínez Pérez
Keyword(s):
Deep Learning
◽
Privacy Preserving
◽
Continuous Authentication
Download Full-text
Physical Access Protection using Continuous Authentication
2008 IEEE Conference on Technologies for Homeland Security
◽
10.1109/ths.2008.4534505
◽
2008
◽
Cited By ~ 7
Author(s):
Roland H.C. Yap
◽
Terence Sim
◽
Geraldine X. Y. Kwang
◽
Rajiv Ramnath
Keyword(s):
Continuous Authentication
◽
Physical Access
Download Full-text
A privacy-aware continuous authentication scheme for proximity-based access control
Computers & Security
◽
10.1016/j.cose.2013.05.004
◽
2013
◽
Vol 39
◽
pp. 117-126
◽
Cited By ~ 7
Author(s):
Isaac Agudo
◽
Ruben Rios
◽
Javier Lopez
Keyword(s):
Access Control
◽
Authentication Scheme
◽
Continuous Authentication
Download Full-text
A Temporal Memory-based Continuous Authentication System
2021 IEEE International Joint Conference on Biometrics (IJCB)
◽
10.1109/ijcb52358.2021.9484365
◽
2021
◽
Author(s):
Sindhu Reddy Kalathur Gopal
◽
Diksha Shukla
Keyword(s):
Temporal Memory
◽
Continuous Authentication
◽
Authentication System
Download Full-text
A survey on different continuous authentication systems
International Journal of Biometrics
◽
10.1504/ijbm.2019.096574
◽
2019
◽
Vol 11
(1)
◽
pp. 67
◽
Cited By ~ 2
Author(s):
S. Ayeswarya
◽
Jasmine Norman
Keyword(s):
Continuous Authentication
Download Full-text
Continuous Authentication Using Mouse Clickstream Data Analysis
Security, Privacy, and Anonymity in Computation, Communication, and Storage - Lecture Notes in Computer Science
◽
10.1007/978-3-030-24900-7_6
◽
2019
◽
pp. 76-85
◽
Cited By ~ 4
Author(s):
Sultan Almalki
◽
Prosenjit Chatterjee
◽
Kaushik Roy
Keyword(s):
Data Analysis
◽
Clickstream Data
◽
Continuous Authentication
Download Full-text
Sign in / Sign up
Close
Export Citation Format
Close
Share Document
Close