|
[1]Google. Our Mobile Planet. Available from: http://think.withgoogle.com/mobileplanet/zh-tw/downloads/. [2]Ildar Muslukhov, Survey: Data Protection in Smartphones Against Physical Threats. Term Project Papers on Mobile Security. University of British Columbia, 2012. [3]Privacy and Data Management on Mobile Devices. Available from: http://www.pewinternet.org/2012/09/05/privacy-and-data-management-on-mobile-devices/. [4]Elaine Shi, Yuan Niu, Markus Jakobsson, and Richard Chow, Implicit authentication through learning user behavior, in Information Security. 2011, Springer. p. 99-113. [5]Eiji Hayashi, Sauvik Das, Shahriyar Amini, Jason Hong, and Ian Oakley. Casa: context-aware scalable authentication. in Proceedings of the Ninth Symposium on Usable Privacy and Security. 2013. ACM. [6]Yusuf Albayram, Sotirios Kentros, Ruhua Jiang, and Athanasios Bamis, A Method for Improving Mobile Authentication Using Human Spatio-Temporal Behavior. [7]Alexander De Luca, Alina Hang, Frederik Brudy, Christian Lindner, and Heinrich Hussmann, Implicit Authentication Based on Touch Screen Patterns. In Proceedings of the SIGCHI Conference on Human Factors in Computing Systems, 2012, pp.987-996. [8]Yonggon Kim, Ohmin Kwon, Sunwoo Kim, Byungjin Jeong, and Hyunsoo Yoon, Protecting Mobile Devices from Adversarial User by Fine-Grained Analysis of User Behavior, in Advanced in Computer Science and its Applications. 2014, Springer. p. 445-451. [9]Richard Chow, Markus Jakobsson, Ryusuke Masuoka, Jesus Molina, Yuan Niu, Elaine Shi, and Zhexuan Song, Authentication in the clouds: a framework and its application to mobile users, in Proceedings of the 2010 ACM workshop on Cloud computing security workshop2010, ACM: Chicago, Illinois, USA. p. 1-6. [10]Markus Jakobsson, Elaine Shi, Philippe Golle, and Richard Chow. Implicit authentication for mobile devices. in Proceedings of the 4th USENIX conference on Hot topics in security. 2009. USENIX Association. [11]Jiang Zhu, Pang Wu, Xiao Wang, and Joy Zhang. SenSec: Mobile security through passive sensing. IEEE International Conference on Computing, Networking and Communications (ICNC), 2013, pp.1125-1133. [12]Karen Sparck Jones, A statistical interpretation of term specificity and its application in retrieval. Journal of documentation, 1972. 28(1): p. 11-21. [13]Gerard Salton, Anita Wong, and Chung-Shu Yang, A vector space model for automatic indexing. Communications of the ACM, 1975. 18(11): p. 613-620.
|