Abstract
The usable security community seems ready for another attempt to move beyond passwords. We shed light on current scientific developments in implicit authentication—that is, authentication approaches in which physiological features and behavior authenticate users—and discuss opportunities and obstacles.
Talk to us
Join us for a 30 min session where you can share your feedback and ask us any queries you have