DC Field | Value | Language |
---|---|---|
dc.contributor | Department of Electronic and Information Engineering | en_US |
dc.creator | Li, WJ | en_US |
dc.creator | Wang, Y | en_US |
dc.creator | Tan, J | en_US |
dc.creator | Zhu, N | en_US |
dc.date.accessioned | 2021-11-17T06:29:50Z | - |
dc.date.available | 2021-11-17T06:29:50Z | - |
dc.identifier.issn | 1383-469X | en_US |
dc.identifier.uri | http://hdl.handle.net/10397/91604 | - |
dc.language.iso | en | en_US |
dc.publisher | Springer | en_US |
dc.subject | User authentication | en_US |
dc.subject | Double click | en_US |
dc.subject | Smartphone security | en_US |
dc.subject | Behavioral authentication | en_US |
dc.subject | Touch dynamics | en_US |
dc.title | DCUS : evaluating double-click-based unlocking scheme on smartphones | en_US |
dc.type | Journal/Magazine Article | en_US |
dc.identifier.doi | 10.1007/s11036-021-01842-1 | en_US |
dcterms.abstract | With the increasing capability of software and hardware, mobile devices especially smartphones are changing the way of peoples’ communication and living styles. For the sake of convenience, people often store a lot of personal data like images on the device and use it for completing sensitive tasks like payment and financial transfer. This makes data protection more important on smartphones. To secure the device from unauthorized access, one simple and efficient method is to design a device or screen unlock mechanism, which can authenticate the identity of current user. However, most existing unlock schemes can be compromised if an attacker gets the correct pattern. In this work, we advocate that behavioral biometrics can be useful to improve the security of unlock mechanisms. We thus design DCUS, a double-click-based unlocking scheme on smartphones, which requires users to unlock the device by double clicking on the right location on an image. For user authentication, our scheme needs to check the selected images, image location and double-click patterns. In the evaluation, we perform a user study with 60 participants and make a comparison between our scheme and a similar unlock scheme. With several typical supervised classifiers, it is found that participants can perform well under our scheme. | en_US |
dcterms.accessRights | embargoed access | en_US |
dcterms.bibliographicCitation | Mobile networks and applications, 2021, Online first, https://doi.org/10.1007/s11036-021-01842-1 | en_US |
dcterms.isPartOf | Mobile networks and applications | en_US |
dcterms.issued | 2021 | - |
dc.identifier.isi | WOS:000711341700002 | - |
dc.identifier.eissn | 1572-8153 | en_US |
dc.description.validate | 202111 bcwh | en_US |
dc.description.oa | Not applicable | en_US |
dc.identifier.FolderNumber | a1068-n04 | - |
dc.identifier.SubFormID | 43872-3 | - |
dc.description.fundingSource | Others | en_US |
dc.description.fundingText | National Natural Science Foundation of China (No. 61802080 and 61802077) | en_US |
dc.description.pubStatus | Early release | en_US |
dc.date.embargo | 2022.10.27 | en_US |
Appears in Collections: | Journal/Magazine Article |
Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.