TY - CHAP T1 - Implicit Authentication through Learning User Behavior T2 - Information Security Y1 - 2011 A1 - Elaine Shi A1 - Niu, Yuan A1 - Jakobsson, Markus A1 - Chow, Richard ED - Burmester, Mike ED - Tsudik, Gene ED - Magliveras, Spyros ED - Ilic, Ivana KW - Computer science AB - Users are increasingly dependent on mobile devices. However, current authentication methods like password entry are significantly more frustrating and difficult to perform on these devices, leading users to create and reuse shorter passwords and pins, or no authentication at all. We present implicit authentication - authenticating users based on behavior patterns. We describe our model for performing implicit authentication and assess our techniques using more than two weeks of collected data from over 50 subjects. JA - Information Security T3 - Lecture Notes in Computer Science PB - Springer Berlin / Heidelberg VL - 6531 SN - 978-3-642-18177-1 UR - http://www.springerlink.com/content/m57u551u3133475m/abstract/ ER -