Proceedings of the 2017 ACM International Joint Conference on Pervasive and Ubiquitous Computing and Proceedings of the 2017 AC 2017
DOI: 10.1145/3123024.3123087
|View full text |Cite
|
Sign up to set email alerts
|

One-step, three-factor authentication in a single earpiece

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
11
0

Year Published

2018
2018
2024
2024

Publication Types

Select...
5
3

Relationship

0
8

Authors

Journals

citations
Cited by 10 publications
(11 citation statements)
references
References 9 publications
0
11
0
Order By: Relevance
“…(3) The paper had to propose an authentication scheme. Specifically, the paper had to use machine learning to label [12], [33], [41], [42] IMWUT/UbiComp [11], [20], [25], [35], [48] INFOCOM [8], [36], [45], [51], [53] MobiCom [15], [32] MobiSys [7], [31] NDSS [5], [17], [49], [50] Pattern Recognition [2], [9], [18], [24], [38], [40], [54]…”
Section: Review Of Recent Authentication Systemsmentioning
confidence: 99%
“…(3) The paper had to propose an authentication scheme. Specifically, the paper had to use machine learning to label [12], [33], [41], [42] IMWUT/UbiComp [11], [20], [25], [35], [48] INFOCOM [8], [36], [45], [51], [53] MobiCom [15], [32] MobiSys [7], [31] NDSS [5], [17], [49], [50] Pattern Recognition [2], [9], [18], [24], [38], [40], [54]…”
Section: Review Of Recent Authentication Systemsmentioning
confidence: 99%
“…• Once an accepting sample via the feature vector API has been found, it may be possible to obtain an input that results in this sample (after feature extraction), as demonstrated by Garcia et al with the training of an autoencoder for both feature extraction and the regeneration of the input image [23]. • In this work, we have focused on authentication as a binary classification problem, largely because of its widespread use in biometric authentication [8], [9], [10], [11], [12], [13], [14], [15], [16], [26]. However, authentication has also been framed as a one-class classification problem [56], [26] or as multi-class classification [26], e.g., in a discrimination model, as noted earlier.…”
Section: Discussionmentioning
confidence: 99%
“…The target user's data for training is obtained during the registration or enrollment phase. For the negative class, the usual process is to use the data of a subset of other users enrolled in the system [27], [8], [7], [9], [10], [11], [12], [13], [14], [15], [16]. Following best machine learning practice, the data (from both classes) is split into a training and test set.…”
Section: A Biometric Authentication Systemsmentioning
confidence: 99%
See 1 more Smart Citation
“…An alternative is required. These two issues need to be resolved in employing three-factor authentication: to address the first issue, we need to develop a simple three-factor authentication process such as one-step three-factor authentication (Curran et al, 2017 ) and to address the second issue, biometrics must necessarily become more ubiquitous. If biometrics are popularly used and the biometric information for each user is saved in their smart device and not in the Cloud, the additional risk of biometric information leakage would not emerge.…”
Section: Workable Solutions and Future Challengesmentioning
confidence: 99%