Zobrazeno 1 - 10
of 10
pro vyhledávání: '"Daniel Hintze"'
Autor:
Eckhard Koch, Philipp Kapfer, Matthias Füller, Rene Mayrhofer, Muhammad Muaaz, Sebastian Scholz, Daniel Hintze, Rainhard Dieter Findling
Publikováno v:
Proceedings of the ACM on Interactive, Mobile, Wearable and Ubiquitous Technologies. 3:1-23
People own and carry an increasing number of ubiquitous mobile devices, such as smartphones, tablets, and notebooks. Being small and mobile, those devices have a high propensity to become lost or stolen. Since mobile devices provide access to their o
Publikováno v:
IEEE Transactions on Mobile Computing. 16:1163-1175
As users start carrying multiple mobile devices, we propose a novel, token based mobile device unlocking approach. Mobile devices are conjointly shaken to transfer the authentication state from an unlocked token device to another device to unlock it.
Autor:
Matthias Füller, Rainhard Dieter Findling, Muhammad Muaaz, Sebastian Scholz, Rene Mayrhofer, Wilhelm Nüßer, Philipp Kapfer, Daniel Hintze
Publikováno v:
MoMM
This paper presents the design and open source implementation of Cormorant, an Android authentication framework able to increase usability and security of mobile authentication. It uses transparent behavioral and physiological biometrics like gait, f
Publikováno v:
UbiComp Adjunct
Mobile devices offer access to our digital lives and thus need to be protected against the risk of unauthorized physical access by applying strong authentication, which in turn adversely affects usability. The actual risk, however, depends on dynamic
Autor:
Andrew Rice, Daniel Hintze
Publikováno v:
MASCOTS
There is growing demand for researchers to share datasets in order to allow others to reproduce results or investigate new questions. The most common option is to simply deposit the data online in its entirety. However, this mechanism of distribution
Autor:
Muhammad Muaaz, Sebastian Scholz, Rainhard Dieter Findling, Eckhard Koch, Rene Mayrhofer, Daniel Hintze
Publikováno v:
MoMM
Mobile devices, ubiquitous in modern lifestyle, embody and provide convenient access to our digital lives. Being small and mobile, they are easily lost or stole, therefore require strong authentication to mitigate the risk of unauthorized access. Com
Publikováno v:
UbiComp/ISWC Adjunct
Nowadays, people own and carry an increasing number of mobile devices, such as smartphones and smartwatches. Since these devices store and provide access to sensitive information, authentication is required to prevent unauthorized access. Widely used
Autor:
Daniel Hintze
Publikováno v:
UbiComp/ISWC Adjunct
Mobile devices are ubiquitous today and because they provide access to our digital lives, strong authentication is required to prevent unauthorized access. Commonly applied knowledge-based mechanisms like PIN and password, however, fail to scale with
Publikováno v:
MoMM
The inherent weakness of typical mobile device unlocking approaches (PIN, password, graphic pattern) is that they demand time and attention, leading a majority of end users to disable them, effectively lowering device security.We propose a method for
Publikováno v:
MoMM
Smartphones and tablets are an indispensable part of modern communication and people spend considerable time interacting with their devices every day. While substantial research has been conducted concerning smartphone usage, little is known about ho