Towards Wider Adoption of Continuous Authentication on Mobile Devices

Continuous Authentication (CA) is the process of constantly checking for the authorized user’s presence, which brings unique advantages and disadvantages. CA is more secure and facilitates schemes with multiple levels of authentication security; however,

  • PDF / 9,684,404 Bytes
  • 269 Pages / 439.42 x 683.15 pts Page_size
  • 81 Downloads / 175 Views

DOWNLOAD

REPORT


Thirimachos Bourlai Panagiotis Karampelas Vishal M. Patel  Editors

Securing Social Identity in Mobile Platforms Technologies for Security, Privacy and Identity Management

Advanced Sciences and Technologies for Security Applications Series Editor Anthony J. Masys, Associate Professor, Director of Global Disaster Management, Humanitarian Assistance and Homeland Security, University of South Florida, Tampa, USA Advisory Editors Gisela Bichler, California State University, San Bernardino, CA, USA Thirimachos Bourlai, Lane Department of Computer Science and Electrical Engineering, Multispectral Imagery Lab (MILab), West Virginia University, Morgantown, WV, USA Chris Johnson, University of Glasgow, Glasgow, UK Panagiotis Karampelas, Hellenic Air Force Academy, Attica, Greece Christian Leuprecht, Royal Military College of Canada, Kingston, ON, Canada Edward C. Morse, University of California, Berkeley, CA, USA David Skillicorn, Queen’s University, Kingston, ON, Canada Yoshiki Yamagata, National Institute for Environmental Studies, Tsukuba, Ibaraki, Japan

Indexed by SCOPUS The series Advanced Sciences and Technologies for Security Applications comprises interdisciplinary research covering the theory, foundations and domainspecific topics pertaining to security. Publications within the series are peerreviewed monographs and edited works in the areas of: – biological and chemical threat recognition and detection (e.g., biosensors, aerosols, forensics) – crisis and disaster management – terrorism – cyber security and secure information systems (e.g., encryption, optical and photonic systems) – traditional and non-traditional security – energy, food and resource security – economic security and securitization (including associated infrastructures) – transnational crime – human security and health security – social, political and psychological aspects of security – recognition and identification (e.g., optical imaging, biometrics, authentication and verification) – smart surveillance systems – applications of theoretical frameworks and methodologies (e.g., grounded theory, complexity, network sciences, modelling and simulation) Together, the high-quality contributions to this series provide a cross-disciplinary overview of forefront research endeavours aiming to make the world a safer place. The editors encourage prospective authors to correspond with them in advance of submitting a manuscript. Submission of manuscripts should be made to the Editorin-Chief or one of the Editors.

More information about this series at http://www.springer.com/series/5540

Thirimachos Bourlai • Panagiotis Karampelas Vishal M. Patel Editors

Securing Social Identity in Mobile Platforms Technologies for Security, Privacy and Identity Management

Editors Thirimachos Bourlai Lane Department of Computer Science and Electrical Engineering Multispectral Imagery Lab (MILab) West Virginia University Morgantown, WV, USA

Panagiotis Karampelas Department of Informatics and Computers Hellenic Air Force Academy Acharnes Attica, Greece

Vishal M. Patel D