2000
DOI: 10.21236/ada382238
|View full text |Cite
|
Sign up to set email alerts
|

Secure Continuous Biometric-Enhanced Authentication

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
9
0

Year Published

2005
2005
2023
2023

Publication Types

Select...
4
3
2

Relationship

0
9

Authors

Journals

citations
Cited by 34 publications
(9 citation statements)
references
References 18 publications
0
9
0
Order By: Relevance
“…A number of studies on continuous user authentication have been published [7]- [14]. These schemes typically use one or more primary (hard) biometric traits (e.g., fingerprint or face).…”
Section: Introductionmentioning
confidence: 99%
“…A number of studies on continuous user authentication have been published [7]- [14]. These schemes typically use one or more primary (hard) biometric traits (e.g., fingerprint or face).…”
Section: Introductionmentioning
confidence: 99%
“…• Support for multiple users sharing a certain account; this may require a biometric hand-off [4] to occur between users.…”
Section: Resultsmentioning
confidence: 99%
“…The study conducted by Klosterman et al [4] in the design of biometric-enhanced authentication system describes the challenges posed by such a system. It points out that for unobtrusive continuous monitoring of a user's biometric traits, the choice of trait should be such that it does not hinder the user from working.…”
Section: Related Workmentioning
confidence: 99%
“…Therefore, person verification should be carried out continuously until the end of the exam. Some older studies claim that continuous authentication leads to high computational cost [7], but fortunately, computers nowadays have much higher performance than ten years ago. Furthermore, it is not necessary to perform authentication checks at extremely short intervals.…”
Section: Using Touch Gestures For Authenticationmentioning
confidence: 99%