1![Privacy-Preserving Implicit Authentication Nashad Safa Rei Safavi-Naini Siamak Shahandashti Privacy-Preserving Implicit Authentication Nashad Safa Rei Safavi-Naini Siamak Shahandashti](https://www.pdfsearch.io/img/5884bebe6e72e613fd5610d2ad8300d2.jpg) | Add to Reading ListSource URL: www-users.cs.york.ac.ukLanguage: English - Date: 2017-02-20 12:19:35
|
---|
2![Privacy concerns of implicit secondary factors for web authentication Joseph Bonneau 1. Privacy concerns of implicit secondary factors for web authentication Joseph Bonneau 1.](https://www.pdfsearch.io/img/d8b5c522affd9066b5c92521418292c6.jpg) | Add to Reading ListSource URL: www.jbonneau.comLanguage: English - Date: 2018-05-15 14:47:16
|
---|
3![Usability and Security Perceptions of Implicit Authentication: Convenient, Secure, Sometimes Annoying Hassan Khan, Urs Hengartner, and Daniel Vogel Cheriton School of Computer Science University of Waterloo Waterloo, ON Usability and Security Perceptions of Implicit Authentication: Convenient, Secure, Sometimes Annoying Hassan Khan, Urs Hengartner, and Daniel Vogel Cheriton School of Computer Science University of Waterloo Waterloo, ON](https://www.pdfsearch.io/img/39341836c68dadccc3cdb77d9c20b2dc.jpg) | Add to Reading ListSource URL: www.usenix.orgLanguage: English - Date: 2016-02-21 12:56:58
|
---|
4![Privacy concerns of implicit secondary factors for web authentication Joseph Bonneau 1. Privacy concerns of implicit secondary factors for web authentication Joseph Bonneau 1.](https://www.pdfsearch.io/img/f03e0daccebe44ba125d50531aa7110b.jpg) | Add to Reading ListSource URL: cups.cs.cmu.eduLanguage: English - Date: 2014-06-14 02:22:08
|
---|
5![Insidious Implicit Windows Trust Relationships PLEASE STAND BY 7 June 2013 – BSides Detroit Insidious Implicit Windows Trust Relationships PLEASE STAND BY 7 June 2013 – BSides Detroit](https://www.pdfsearch.io/img/60b009efe7decdf3804079ddc55fbab1.jpg) | Add to Reading ListSource URL: foofus.netLanguage: English - Date: 2013-08-12 12:00:00
|
---|
6![Session: I Am How I Touch: Authenticating Users CHI 2012, May 5–10, 2012, Austin, Texas, USA Touch me once and I know it’s you! Implicit Authentication based on Touch Screen Patterns Session: I Am How I Touch: Authenticating Users CHI 2012, May 5–10, 2012, Austin, Texas, USA Touch me once and I know it’s you! Implicit Authentication based on Touch Screen Patterns](https://www.pdfsearch.io/img/afd80c4e2c4685f9670ebb3a55809c1a.jpg) | Add to Reading ListSource URL: www.medien.ifi.lmu.deLanguage: English - Date: 2012-07-09 11:59:56
|
---|