Li, 2020
ViewPDF| Publication | Publication Date | Title | 
|---|---|---|
| Li et al. | Touch well before use: Intuitive and secure authentication for IoT devices | |
| US11563564B2 (en) | Authentication processing service | |
| US11720656B2 (en) | Live user authentication device, system and method | |
| US12047773B2 (en) | System and method for implicit authentication | |
| Li et al. | T2pair: Secure and usable pairing for heterogeneous iot devices | |
| US9832206B2 (en) | System, method and authorization device for biometric access control to digital devices | |
| US20200110482A1 (en) | Method and apparatus for battery-free identification token for touch sensing devices | |
| Guerar et al. | CirclePIN: A novel authentication mechanism for smartwatches to prevent unauthorized access to IoT devices | |
| Buriro | Behavioral biometrics for smartphone user authentication | |
| Ayeswarya et al. | A comprehensive review on secure biometric-based continuous authentication and user profiling | |
| US12231897B2 (en) | Password-free usable and secure pairing of IoT devices | |
| WO2023016682A1 (en) | Authentication processing services for generating high-entropy cryptographic keys | |
| Mare et al. | SAW: Wristband-based authentication for desktop computers | |
| Shrestha et al. | ZEMFA: zero-effort multi-factor authentication based on multi-modal gait biometrics | |
| Mare et al. | Continuous smartphone authentication using wristbands | |
| Gupta | Next-generation user authentication schemes for iot applications | |
| Wu et al. | Use it-no need to shake it! Accurate implicit authentication for everyday objects with smart sensing | |
| WO2023244602A1 (en) | Systems and methods that provide a high level of security for a user | |
| Dhondge et al. | Optical wireless authentication for smart devices using an onboard ambient light sensor | |
| Li | Smart Sensing Enabled Secure and Usable Pairing and Authentication | |
| Wu et al. | T2Pair++: Secure and Usable IoT Pairing with Zero Information Loss | |
| Mare | Seamless Authentication for Ubiquitous Devices | |
| Acar | Privacy-aware Security Applications in the Era of Internet of Things | |
| Sturgess | Authentication in systems with limited input capabilities | |
| Neal et al. | Presentation attacks in mobile and continuous behavioral biometric systems |