References
Sivarajah, U., Irani, Z., & Weerakkody, V. (2015). Evaluating the use and impact of Web 2.0 technologies in local government. Government Information Quarterly, 32(4), 473-487. DOI: https://doi.org/10.1016/j.giq.2015.06.004
Hu, P., Ning, H., Qiu, T., Song, H., Wang, Y., & Yao, X. (2017). Security and privacy preservation scheme of face identification and resolution framework using fog computing in internet of things. IEEE Internet of Things Journal, 4(5), 1143-1155. DOI: 10.1109/JIOT.2017.2659783
Miranda, J., Mäkitalo, N., Garcia-Alonso, J., Berrocal, J., Mikkonen, T., Canal, C., & Murillo, J. M. (2015). From the Internet of Things to the Internet of People. IEEE Internet Computing, 19(2), 40-47. DOI: 10.1109/MIC.2015.24
Memon, N. (2017). How Biometric Authentication Poses New Challenges to Our Security and Privacy [In the Spotlight]. IEEE Signal Processing Magazine, 34(4), 196-194. DOI: 10.1109/MSP.2017.2697179
Siddiqui, Z., Abdullah, A. H., Khan, M. K., & Alghamdi, A. S. (2014). Smart environment as a service: three factor cloud based user authentication for telecare medical information system. Journal of medical systems, 38(1), 9997. DOI: https://doi.org/10.1007/s10916-013-9997-5
Zhang, Z., Aziz, E. S., Esche, S., & Chassapis, C. (2018). A Virtual Proctor with Biometric Authentication for Facilitating Distance Education. In Online Engineering & Internet of Things(pp. 110-124). Springer, Cham. DOI: https://doi.org/10.1007/978-3-319-64352-6_11
Ometov, A., Bezzateev, S., Mäkitalo, N., Andreev, S., Mikkonen, T., & Koucheryavy, Y. (2018). Multi-Factor Authentication: A Survey. Cryptography, 2(1), 1-31. DOI: 10.3390/cryptography2010001
Jiang, L., & Meng, W. (2017). Smartphone user authentication using touch dynamics in the big data era: Challenges and opportunities. In Biometric Security and Privacy (pp. 163-178). Springer, Cham. DOI: https://doi.org/10.1007/978-3-319-47301-7_7
Galdi, C., Nappi, M., Dugelay, J. L., & Yu, Y. (2018). Exploring New Authentication Protocols for Sensitive Data Protection on Smartphones. IEEE Communications Magazine, 56(1), 136-142.
Apple (2018). https://www.apple.com/es/iphone-x/ Website of Apple. Last visit: March 05, 2018.
Samsung (2018).
http://www.samsung.com/es/smartphones/galaxy-s8/ Website of Samsung. Last visit: March 05, 2018.
Traoré, I., Nakkabi, Y., Saad, S., Sayed, B., Ardigo, J. D., & de Faria Quinan, P. M. (2017). Ensuring Online Exam Integrity Through Continuous Biometric Authentication. In Information Security Practices (pp. 73-81). Springer, Cham. DOI: https://doi.org/10.1007/978-3-319-48947-6_6
Karim, N. A., & Shukur, Z. (2015). Review of user authentication methods in online examination. Asian Journal of Information Technology, 14(5), 166-175. DOI: 10.3923/ajit.2015.166-175
Guillén-Gamez, F. D., García-Magariño, I., Bravo, J., & Plaza, I. (2015). Exploring the influence of facial verification software on student academic performance in online learning environments. Int. J. Eng. Edu., 31(6A), 1622-1628.
Shah, K., Shah, S., Shah, T., Shinde, R., & Gharat, S. (2017). Secure Examination System using Biometric and QR Code Technology. International Journal of Engineering Science, 10365.
Fenu, G., Marras, M., & Boratto, L. (2017). A multi-biometric system for continuous student authentication in e-learning platforms. Pattern Recognition Letters. DOI: https://doi.org/10.1016/j.patrec.2017.03.027
Labayen, M., Vea, R., Flórez, J., Guillén-Gámez, F. D., & García-Magariño, I. (2014). Smowl: a tool for continuous student validation based on face recognition for online learning. In Edulearn14 Proceedings (pp. 5354-5359). IATED.
Guillén-Gámez, F. D., García-Magariño, I., Bravo-Agapito, J., Lacuesta, R., & Lloret, J. (2017). A proposal to improve the authentication process in m-health environments. IEEE Access, 5, 22530-22544. DOI: 10.1109/ACCESS.2017.2752176
Kawamata, T., Ishii, T., Fujimori, S., & Akakura, T. (2016, November). Student authentication by updated facial information with weighting coefficient in e-Learning. In Region 10 Conference (TENCON), 2016 IEEE (pp. 551-555). IEEE. DOI: 10.1109/TENCON.2016.7848061
Li, Y., Xu, K., Yan, Q., Li, Y., & Deng, R. H. (2014, June). Understanding OSN-based facial disclosure against face authentication systems. In Proceedings of the 9th ACM symposium on Information, computer and communications security (pp. 413-424). ACM. DOI: 10.1145/2590296.2590315