2013
DOI: 10.1007/978-1-4614-7597-2_8
|View full text |Cite
|
Sign up to set email alerts
|

User Classification and Authentication for Mobile Device Based on Gesture Recognition

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1

Citation Types

0
3
0

Year Published

2016
2016
2022
2022

Publication Types

Select...
2
1
1

Relationship

0
4

Authors

Journals

citations
Cited by 4 publications
(3 citation statements)
references
References 2 publications
0
3
0
Order By: Relevance
“…Most experiments recruited less than 50 subjects (Buschek et al, 2015;Kambourakis et al, 2014;Y. Meng et al, 2014), with some less than 5 subjects (Nixon et al, 2014;Rao et al, 2014). We were only able to find three experiments, (Gascon et al, 2014;Serwadda et al, 2013;, which used a large number of subjects (315, 190 and 152 subjects, respectively).…”
Section: Subject Sizementioning
confidence: 92%
See 1 more Smart Citation
“…Most experiments recruited less than 50 subjects (Buschek et al, 2015;Kambourakis et al, 2014;Y. Meng et al, 2014), with some less than 5 subjects (Nixon et al, 2014;Rao et al, 2014). We were only able to find three experiments, (Gascon et al, 2014;Serwadda et al, 2013;, which used a large number of subjects (315, 190 and 152 subjects, respectively).…”
Section: Subject Sizementioning
confidence: 92%
“…The touch size value captured from a subject is determined by the subject's fingertip size. For example, the authors of (Nixon et al, 2014) observed that an adult male subject usually produces a larger touch size value than a child or an adult female subject. This means that it is hard for people with different fingertip sizes to mimic each other.…”
Section: Spatial Feature (Sp)mentioning
confidence: 99%
“…A related set of approaches does not try to prevent unauthorized access, but rather take an auditing approach. For example, learning the wrist motions of different people can create an audit trail [165], which can then be used to identify tampering for later remediation.…”
Section: Tampering Authentication and Active Non-compliancementioning
confidence: 99%