Authentication Technology

Privacy-Enhancing Context Authentication from Location-Sensitive Data

Authors: Pradip Mainali, Carlton Shepherd, Fabien A. P. Petitcolas | Published: 2019-04-18 | Updated: 2019-07-10
Data Protection Method
Privacy Protection
Authentication Technology

WristAuthen: A Dynamic Time Wrapping Approach for User Authentication by Hand-Interaction through Wrist-Worn Devices

Authors: Qi Lyu, Zhifeng Kong, Chao Shen, Tianwei Yue | Published: 2017-10-22
Data Collection Method
Feature Selection
Authentication Technology