Theoretical Requirements of a Transparent Authentication System

  • Nathan Clarke


Part 1 of the book clearly identified the current issues surrounding user authentication, the increasing burden placed upon the end-user and the fundamental flaw that links authentication with an initial login rather than the specific action that carries the risk. It introduced the concept of transparent and continuous authentication as a process for enabling a more reliable and realistic measure of the system’s confidence in the identity of the user. Part 2 of the book provided a more technical insight into the current authentication processes and illustrated how transparent authentication could function on an individual technique perspective. Key to this concept is the use of biometrics and this section also evidenced the role multibiometrics and biometric standards have in establishing effective transparent authentication.


Mobile Device Personal Identification Number False Acceptance Rate Biometric Template Authentication Request 
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.


  1. Clarke, N.L.: Advanced user authentication for mobile devices. PhD Thesis, University of Plymouth, Plymouth (2004)Google Scholar
  2. Clarke, N.L., Furnell, S.M.: Keystroke dynamics on a mobile handset: a feasibility study. Inform. Manage. Comput. Secur. 11(4), 161–166 (2003)CrossRefGoogle Scholar
  3. Clarke, N.L., Furnell, S.M.: A composite user authentication architecture for mobile devices. J. Inform. Warfare 5(2), 11–29 (2006)Google Scholar
  4. Karatzouni, S., Clarke, N.L., Furnell, S.M.: NICA design specification. University of Plymouth. Available at: (2007). Accessed 10 Apr 2011
  5. Mansfield, T., Kelly, G., Chandler, D., Kane, J.: Biometric Product Testing: Final Report. Crown Copyright, UK (2001)Google Scholar
  6. Monrose, F., Reiter, M., Wetzel, S.: Password hardening based upon keystroke dynamics. In: Proceedings of the 6th ACM Conference on Computer and Communications Security, New York (1999)Google Scholar

Copyright information

© Springer-Verlag London Limited 2011

Authors and Affiliations

  1. 1.Centre for Security, Communications & Network Research (CSCAN)Plymouth UniversityPlymouthUK

Personalised recommendations