|
[1] M. Weiser, “The Computer for the 21st century,” Scientific American, 1991 [2] D. Booth, H. Haas, F. McCabe, E. Newcomer, M. Champion, C. Ferris and D. Orchard, “Web Services Architecture,” W3C Working Group Note 11, 2004, [Online]. Available: https://www.w3.org/TR/ws-arch/ [3] R. T. Fielding, “Architectural Styles and the Design of Network-based Software Architectures,” Ph.D. dissertation, Univ. California, Irvine, 2000, [Online]. Available: https://www.ics.uci.edu/~fielding/pubs/dissertation/top.htm [4] T. Dierks, E. Rescorla, “The Transport Layer Security (TLS) Protocol Version 1.2,” RFC 5246, 2008, [Online]. Available: https://www.rfc-editor.org/info/rfc5246 [5] J. Han, “Chaining the Secret: Lightweight Authentication for Security in Pervasive Computing,” in IEEE International Conference on Pervasive Computing and Communication Workshops, Sydney, NSW, Australia, 2016, pp. 1-3 [6] B. Alomair and R. Poovendran, “Efficient Authentication for Mobile and Pervasive Computing,” IEEE Transactions on Mobile Computing, vol. 13, no. 3, pp. 469-481, 2014 [7] K. Ren, W. Lou, K. Kim and R. Deng, “A Novel Privacy Preserving Authentication and Access Control Scheme for Pervasive Computing Environments,” IEEE Transactions Vehicular Technology, vol. 5, no. 4, pp. 1373-1384, 2006 [8] J. C. D. Lima, C. C. Rocha, I. Augustin and M. A. R. Dantas, “A Context-Aware Recommendation System to Behavioral Based Authentication in Mobile and Pervasive Environments,” in IFIP 9th International Conference on Embedded and Ubiquitous Computing (EUC), Melbourne, VIC, Australia, 2011, pp. 312-319 [9] W. Meng, D. S. Wong, S. Furnell and J. Zhou, “Surveying the Development of Biometric User Authentication on Mobile Phones,” IEEE Communications Surveys & Tutorials, vol. 17, no. 3, pp. 1268-1293, 2015 [10] M. O. Derawi, B. Yang, and C. Busch, “Fingerprint Recognition with Embedded Cameras on Mobile Phones,” in 3rd International ICST Conference on Security and Privacy in Mobile Information and Communication Systems, Aalborg, Denmark, 2012, pp. 136-147 [11] S. Sin, R. Zhou, D. Li, T. Isshiki and H. Kunieda, “Narrow Fingerprint Sensor Verification with Template Updating Technique,” IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences, vol. 95, no. 1, pp. 346-353, 2012 [12] S. Chen, A. Pande and P. Mohapatra, “Sensor-assisted Facial Recognition: An Enhanced Biometric Authentication System for Smartphones,” in Proceedings of the 12th Annual International Conference on Mobile systems, applications, and services, Bretton Woods, NH, USA, 2014, pp. 109-122 [13] K. Xi, J. Hu, and F. Han, “Mobile Device Access Control: An Improved Correlation Based Face Authentication Scheme and Its Java ME Application,” Concurrency and Computation: Practice & Experience, vol. 24, no. 10, pp. 1066-1085, 2012 [14] K. R. Park, H.-A. Park, B. J. Kang, E. C. Lee, and D. S. Jeong, “A Study on Iris Localization and Recognition on Mobile Phones,” EURASIP Journal on Advances in Signal Process., vol. 2008, no. 1, pp. 281-943, 2008 [15] M. Kunz, K. Kasper, H. Reininger, M. Mobius and J. Ohms, “Continuous speaker verification in realtime,” in Proceedings of the International Conference of the Biometrics Special Interest Group, Darmstadt, HE, Germany, 2011, pp. 79-87 [16] M. Baloul, E. Cherrier and C. Rosenberger, “Challenge-based Speaker Recognition for Mobile Authentication,” in Proceedings of the International Conference of the Biometrics Special Interest Group, Darmstadt, 2012, pp. 1-7 [17] R. Blanco-Gonzalo, O. Miguel-Hurtado, A. Mendaza-Ormaza and R. Sanchez-Reillo, “Handwritten Signature Recognition in Mobile Scenarios: Performance Evaluation,” in IEEE International Carnahan Conference on Security Technology, Boston, MA, United States, 2012, pp. 174-179 [18] M. O. Derawi, C. Nickely, P. Bours and C. Busch, “Unobtrusive User-Authentication on Mobile Phones Using Biometric Gait Recognition,” in 6th International Conference on Intelligent Information Hiding and Multimedia Signal Processing, Darmstadt, Darmstadt, HE, Germany, 2010, pp. 306-311 [19] F. Li, N. Clarke,M. Papadaki, and P. Dowland, “Active Authentication for Mobile Devices Utilising Behaviour Profiling,” International Journal of Information Security, vol. 13, no. 3 , pp. 229-244, 2014 [20] C. Giuffrida, K. Majdanik, M. Conti and H. Bos, “I Sensed It Was You: Authenticating Mobile Users with Sensor-enhanced Keystroke Dynamics,” in 11th International Conference on Detection of Intrusions and Malware & Vulnerability Assessment, Egham, United Kingdom, 2014, pp. 92-111 [21] L. Li, X. Zhao and G. Xue, “Unobservable Re-authentication for Smartphones,” in Proceedings of the 20th Network and Distributed System Security Symposium, San Diego, CA, United States, 2013, pp. 1-16 [22] Y. Meng, D. S.Wong and L. F. Kwok, “Design of Touch Dynamics Based User Authentication with an Adaptive Mechanism on Mobile Phones,” in Proceedings of the 29th Annual ACM Symposium Applied Computing, Gyeongju, South Korea, 2014, pp. 1680-1687 [23] S. Indu, T. N. Sathya, V. Saravana Kumar, “A Stand-alone and Sms-based Approach for Authentication Using Mobile Phone,” in International Conference on Information Communication and Embedded Systems (ICICES), Chennai, TN, India, 2013, pp. 140-145 [24] P. Tanvi, G. Sonal and S. M. Kumar, “Token Based Authentication Using Mobile Phone,” in International Conference on Communication Systems and Network Technologies (CSNT), Katra, JK, India, 2011, pp. 85-88 [25] M. Shu, C. Tan and H. Wang, “Mobile Authentication Scheme Using SMS,” in SSME '09. IITA International Conference on Services Science, Management and Engineering, Zhangjiajie, China, 2009, pp. 161-164 [26] M. Jones, J. Bradley and N. Sakimura, “JSON Web Token (JWT)”, RFC 7519, 2015, [Online]. Available: http://www.rfc-editor.org/info/rfc7519 [27] D. Giry. (2015, September 17). BlueKrypt Cryptographic Key Length Recommendation [Online]. Available: https://www.keylength.com/en/4/
|