Abstract

The usable security community seems ready for another attempt to move beyond passwords. We shed light on current scientific developments in implicit authentication—that is, authentication approaches in which physiological features and behavior authenticate users—and discuss opportunities and obstacles.

Full Text
Published version (Free)

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call