Smudge attacks on smartphone touch screens, Proceedings of the 4th USENIX conference on Offensive technologies. pp. 1?7. WOOT'10, USENIX Association, 2010. ,
Graphical passwords, ACM Computing Surveys, vol.44, issue.4, 2011. ,
DOI : 10.1145/2333112.2333114
Random forests, Machine Learning, vol.45, issue.1, pp.5-32, 2001. ,
DOI : 10.1023/A:1010933404324
Touch events version 1 -w3c working draft 13 september, pp.2011-2021, 2011. ,
Privacy: Gone with the Typing! Identifying Web Users by Their Typing Pattern In: 4th Hot Topics in Privacy Enhancing Technologies (HotPETs). The 11th Privacy Enhancing Technologies Symposium, 2011. ,
Authentication of users on mobile telephones ??? A survey of attitudes and practices, Computers & Security, vol.24, issue.7, pp.519-527, 2005. ,
DOI : 10.1016/j.cose.2005.08.003
Authenticating mobile phone users using keystroke analysis, International Journal of Information Security, vol.23, issue.5, pp.1-14, 2007. ,
DOI : 10.1007/s10207-006-0006-6
Flexible and Transparent User Authentication for Mobile Devices, In: SEC. pp, vol.24, issue.7, pp.1-12, 2009. ,
DOI : 10.1016/j.cose.2005.08.003
Mind how you answer me!, Proceedings of the 6th ACM Symposium on Information, Computer and Communications Security, ASIACCS '11, pp.249-259, 2011. ,
DOI : 10.1145/1966913.1966945
Unobtrusive User-Authentication on Mobile Phones Using Biometric Gait Recognition, 2010 Sixth International Conference on Intelligent Information Hiding and Multimedia Signal Processing, pp.306-311, 2010. ,
DOI : 10.1109/IIHMSP.2010.83
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.190.5072
Mobile Trusted Computing Based on MTM, IJDTIS, vol.1, issue.4, pp.25-42, 2010. ,
DOI : 10.4018/978-1-61520-682-7.ch003
Trust in a small package, Proceedings of the 2009 ACM workshop on Scalable trusted computing, STC '09, pp.9-18, 2009. ,
DOI : 10.1145/1655108.1655111
Genetic Algorithms in Search, Optimization and Machine Learning, 1989. ,
Android: Android -open source project, 2011. ,
An Efficient Method to Construct a Radial Basis Function Neural Network Classifier, Neural Networks, vol.10, issue.8, pp.1495-1503, 1997. ,
DOI : 10.1016/S0893-6080(97)00002-6
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.48.651
Keystroke Analysis for Thumb-based Keyboards on Mobile Devices, pp.253-263, 2007. ,
DOI : 10.1007/978-0-387-72367-9_22
Ageing Adaptation for Multimodal Biometrics using Adaptive Feature Set Update Algorithm, 2009 IEEE International Advance Computing Conference, pp.535-540, 2009. ,
DOI : 10.1109/IADCC.2009.4809068
Particle swarm optimization, Proceedings of ICNN'95, International Conference on Neural Networks, pp.1942-1948, 1995. ,
DOI : 10.1109/ICNN.1995.488968
Why Did My Detector Do That?!, Proceedings of the 13th international conference on Recent advances in intrusion detection, pp.256-276, 2010. ,
DOI : 10.1007/978-3-642-15512-3_14
Comparing anomaly-detection algorithms for keystroke dynamics, 2009 IEEE/IFIP International Conference on Dependable Systems & Networks, pp.125-134, 2009. ,
DOI : 10.1109/DSN.2009.5270346
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.153.9744
Keystroke biometrics with number-pad input, 2010 IEEE/IFIP International Conference on Dependable Systems & Networks (DSN), pp.201-210, 2010. ,
DOI : 10.1109/DSN.2010.5544311
Pictures at the ATM, Proceedings of the SIGCHI conference on Human factors in computing systems , CHI '07, pp.887-894, 2007. ,
DOI : 10.1145/1240624.1240758
TOKEN: Trustable Keystroke-Based Authentication for Web-Based Applications on Smartphones, Information Security and Assurance, pp.286-297, 2010. ,
DOI : 10.1007/978-3-642-13365-7_28
Using trusted computing for privacy preserving keystroke-based authentication in smartphones, Telecommunication Systems, vol.11, issue.1, pp.1-13, 2011. ,
DOI : 10.1007/s11235-011-9538-9
Scenario test of accelerometer-based biometric gait recognition, 2011 Third International Workshop on Security and Communication Networks (IWSCN), 2011. ,
DOI : 10.1109/IWSCN.2011.6827712
Purely Automated Attacks on PassPoints-Style Graphical Passwords, IEEE Transactions on Information Forensics and Security, vol.5, issue.3, pp.393-405, 2010. ,
DOI : 10.1109/TIFS.2010.2053706
How unique and traceable are usernames? CoRR abs, p.5578, 1101. ,
DOI : 10.1007/978-3-642-22263-4_1
URL : http://arxiv.org/abs/1101.5578
Handling events, pp.40006511-40006512, 2011. ,
On Purely Automated Attacks and Click-Based Graphical Passwords, 2008 Annual Computer Security Applications Conference (ACSAC), pp.111-120, 2008. ,
DOI : 10.1109/ACSAC.2008.18
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.216.2481
Design and evaluation of a shoulder-surfing resistant graphical password scheme, Proceedings of the working conference on Advanced visual interfaces , AVI '06, pp.177-184, 2006. ,
DOI : 10.1145/1133265.1133303
Keystroke-Based User Identification on Smart Phones, Lecture Notes in Computer Science, vol.5758, pp.224-243, 2009. ,
DOI : 10.1007/978-3-642-04342-0_12
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.152.9970
Analyzing Key-Click Patterns of PIN Input for Recognizing VoIP Users, Future Challenges in Security and Privacy for Academia and Industry, IFIP Advances in Information and Communication Technology, pp.247-258 ,
DOI : 10.1007/978-3-642-21424-0_20