Alotaibi S., Furnell S., & Clarke N., Transparent authentication systems for mobile device security: A review, Internet Technology and Secured Transactions (ICITST), 2015 10th International Conference for. IEEE, 2015.
Google Scholar
Alzubaidi A., Kalita J., Authentication of smartphone users using behavioral biometrics, IEEE Communications Surveys & Tutorials 18.3 (2016).
Google Scholar
Bailador G. i in., Analysis of pattern recognition techniques for in-air signature biometrics, [w:] Pattern Recognition 44.10-11 (2011).
Google Scholar
Banerjee S.P., Woodard D.L., Biometric authentication and identification using keystroke dynamics: A survey, „Journal of Pattern Recognition Research” 2012, 7.1.
Google Scholar
Blanco-Gonzalo R. i in., Handwritten signature recognition in mobile scenarios: Performance evaluation, 2012 IEEE International Carnahan Conference on Security Technology (ICCST), 2012.
Google Scholar
Bo C. i in., „Continuous user identification via touch and movement behavioral biometrics, Performance Computing and Communications Conference (IPCCC), 2014 IEEE International. IEEE. 2014.
Google Scholar
Bo C. i in., Silentsense: silent user identification via touch and movement behavioral biometrics, Proceedings of the 19th annual international conference on Mobile computing & networking. ACM. 2013.
Google Scholar
Bolle R.M i in., Guide to biometrics, Springer Science & Business Media, 2013.
Google Scholar
Buriro A. i in., Itsme: Multi-modal and unobtrusive behavioural user authentication for smartphones, International Conference on Passwords, Springer, 2015.
Google Scholar
Braz C., Robert J.M., Security and usability: the case of the user authentication methods, IHM, 2006, Vol. 6.
Google Scholar
Cegiełko Sz., „Kultura użytkowa zabezpieczeń biometrycznych klientów banków w Polsce na podstawie sondażu internetowego, „Bezpieczny Bank” 2018, 3 (72). DOI: 10.26354/bb.8.3.72.2018
Google Scholar
Czyżewski A. i in., Analysis of results of large-scale multimodal biometric identity verification experiment, IET Biometrics 2018, 8(1).
Google Scholar
Damaševicius R. i in., „Smartphone user identity verification using gaitˇ characteristics, Symmetry 2016, 8.10.
Google Scholar
Deb D. i in., Actions Speak Louder Than (Pass) words: Passive Authentication of Smartphone Users via Deep Temporal Features, arXiv preprint arXiv:1901.05107 (2019).
Google Scholar
Fridman L. i in., Active authentication on mobile devices via stylometry, application usage, web browsing, and GPS location, IEEE Systems Journal 2017, 11.2.
Google Scholar
Giuffrida C. i in., I sensed it was you: authenticating mobile users with sensor-enhanced keystroke dynamics, International Conference on Detection of Intrusions and Malware, and Vulnerability Assessment, Springer, 2014.
Google Scholar
Guerra-Casanova J. i in., Authentication in mobile devices through hand gesture recognition, „International Journal of Information Security” 2012, 11.2.
Google Scholar
Hoang T., Choi D., Secure and privacy enhanced gait authentication on smart phone, The Scientific World Journal 2014.
Google Scholar
Hosseini Seyedehzahra, Fingerprint vulnerability: A survey, 2018 4th International Conference on Web Research (ICWR). IEEE, 2018.
Google Scholar
Imgraben J., Engelbrecht A., Choo K.R., Always connected, but are smart mobile users getting more security savvy? A survey of smart mobile device users, Behaviour & Information Technology 2014, 33.12.
Google Scholar
Jain A., Hong L., Pankanti S., Biometric identification, Communications of the ACM 2000, 43.2.
Google Scholar
Jain A.K., Bolle R., Pankanti S., eds. Biometrics: personal identification in networked society, Vol. 479, Springer Science & Business Media, 2006.
Google Scholar
Kałużny S., Behavioural Profiling Authentication Based on Trajectory Based Anomaly Detection Model of User’s Mobility, International Conference on Business Information Systems, Springer, 2017.
Google Scholar
Karnan M., Akila M., Krishnaraj N., Biometric personal authentication using keystroke dynamics: A review, Applied Soft Computing 2011, 11.2.
Google Scholar
Kindt E.J., An Introduction into the Use of Biometric Technology, [w:] Privacy and Data Protection Issues of Biometric Applications, Springer, 2013.
Google Scholar
Li F. i in., Active authentication for mobile devices utilising behaviour profiling, „International Journal of Information Security” 2014, 13.3.
Google Scholar
Li F. i in., Behaviour profiling for transparent authentication for mobile devices, European Conference on Cyber Warfare and Security, Academic Conferences International Limited, 2011.
Google Scholar
Li L., Zhao X., Xue G., Unobservable re-authentication for smartphones, NDSS, 2013.
Google Scholar
Martinez-Diaz M. i in., Mobile signature verification: Feature robustness and performance comparison, IET Biometrics 2014, 3.4.
Google Scholar
Meng W. i in., Surveying the development of biometric user authentication on mobile phones, IEEE Communications Surveys & Tutorials 2015, 17.3.
Google Scholar
Patel V.M., Ratha N.K., Chellappa R., Cancelable Biometrics: A review, IEEE Signal Processing Magazine 2015, 32.5. ISSN: 1053-5888. DOI: 10.1109/MSP.2015.2434151.
Google Scholar
Patel V.M. i in., Continuous user authentication on mobile devices: Recent progress and remaining challenges, IEEE Signal Processing Magazine 2016, 33.4.
Google Scholar
Piekarczyk M., Ogiela M.R., On using palm and finger movements as a gesture-based biometrics, Intelligent Networking and Collaborative Systems (INCOS), 2015 International Conference on, IEEE, 2015.
Google Scholar
Primo A. i in., Context-aware active authentication using smartphone accelerometer measurements, Computer Vision and Pattern Recognition Workshops (CVPRW), 2014 IEEE Conference on, IEEE, 2014.
Google Scholar
Radha N., Karthikeyan S., An evaluation of fingerprint security using noninvertible biohash, „International Journal of Network Security & Its Applications (IJNSA)” 2011, 3.4.
Google Scholar
Raja K.B. i in., Multi-modal authentication system for smartphones using face, iris and periocular, Biometrics (ICB), 2015 International Conference on, IEEE, 2015.
Google Scholar
Roy Aditi i in., Evolutionary methods for generating synthetic masterprint templates: Dictionary attack in fingerprint recognition, 2018 International Conference on Biometrics (ICB), IEEE, 2018.
Google Scholar
Saeed K., Biometrics principles and important concerns, Biometrics and Kansei Engineering, Springer, 2012.
Google Scholar
Saevanee H. i in., Continuous user authentication using multi-modal biometrics, Computers & Security 2015, 53.
Google Scholar
Staszczyk M., Ochrona konsumentów korzystających z usług bankowości elektronicznej na przykładzie ankiety przeprowadzonej wśród osób pracujących i/lub studiujących w Łodzi, „Bezpieczny Bank” 2016, 1 (62).
Google Scholar
Tresadern S. i in., Mobile biometrics (mobio): Joint face and voice verification for a mobile platform, IEEE pervasive computing, 2012.
Google Scholar
Urban A., Woszczynski T., Biometryczne uwierzytelnianie klienta w oddziale bankowym, „Gazeta Bankowa” 2012, 4.
Google Scholar
Wójtowicz A., Joachimiak K., Model for adaptable context-based biometric authentication for mobile devices, Personal and Ubiquitous Computing 2016, 20.2.
Google Scholar
Woo R.H., Park A., Hazen T.J., The MIT mobile device speaker verification corpus: data collection and preliminary experiments, Speaker and Language Recognition Workshop, 2006, IEEE Odyssey 2006: IEEE, 2006.
Google Scholar
Yang L. i in., Unlocking smart phone through handwaving biometrics, IEEE Transactions on Mobile Computing 14.5, 2015.
Google Scholar
Zakonnik Ł., Czerwonka P., Płatnosci mobilne w Polsce – analiza SWOT, Studia i Materialy Polskiego Stowarzyszenia Zarzadzania Wiedzą/Studies & Proceedings Polish Association for Knowledge Management 71, 2014.
Google Scholar
Zou L., Qianhua H., Xiaohui F., Cell phone verification from speech recordings using sparse representation, Acoustics, Speech and Signal Processing (ICASSP), 2015 IEEE International Conference on, IEEE, 2015.
Google Scholar
Związek Banków Polskich, Biometria w bankowości i administracji publicznej, Warszawa 2009.
Google Scholar
Źródła internetowe
Google Scholar
Androidauthority.com. Penetracja rynkowa smartfonów z czujnikami linii papilarnych 2018.
Google Scholar
https://www.androidauthority.com/2018-smartphones-fingerprint-sensors-803905/ (dostęp: 10.09.2018)
Google Scholar
Boczoń W., Bankier.pl. Biometria w bankowości. Co za jej pomocą załatwimy dziś w banku?
Google Scholar
https://www.bankier.pl/wiadomosc/Biometria-wbankowosci-Co-za-jej-pomoca-zalatwimy-dzis-w-banku7542743.html (dostęp: 10.09.2018).
Google Scholar
Bkav „Bkav’s new mask beats Face ID in “twin way”: Severity level raised, do not use Face ID in business transactions” http://www.bkav.com/d/top-news//view_content/content/103968/bkav%EF%BF%BDs-new-mask-beats-face-id-in-twin-way-severity-level-raised-do-not-use-face-id-in-business-transactions (dostęp: 10.03.2019).
Google Scholar
DigiTimes. Penetracja rynkowa smartfonów z czujnikami linii papilarnych 2018. http://www.digitimes.com/news/a20160818PD208.html (dostęp: 10.09.2018).
Google Scholar
Mastercard. Raport Mastercard Bankowość mobilna – trendy i wyróżniki oferty w Polsce i na świecie, http://konferencje.alebank.pl/wp-content/uploads/2017/06/PM.Bankowosc-mobilna.Adam_.Splawski.Mastercard.pdf (dostęp: 10.09.2018).
Google Scholar
Narodowy Bank Polski (NBP), Informacja o rozliczeniach pieniężnych i rozrachunkach międzybankowych w III kwartale 2017 r., https://www.nbp. pl/systemplatniczy/publikacje/2017_3.pdf?v=20171023 (dostęp: 10.09.2018).
Google Scholar
PwC. Mobile Payment Report 2017, https://www.pwc.de/mobilepayment (dostęp: 10.09.2018).
Google Scholar
Statista.com. Penetracja rynkowa smartfonów z czujnikami linii papilarnych 2018. https://www.statista.com/statistics/522058/global-smartphone-fingerprintpenetration/ (dostęp: 10.09.2018).
Google Scholar
Telesign, Lawless Research. Beyond the Password: The Future of Account Security. https://www.telesign.com/wp-content/uploads/2016/06/Telesign-ReportBeyondthePassword-June-2016-1. pdf (dostęp: 10.09.2018).
Google Scholar
Thakkar, Danny. Top Five Biometrics: Face, Fingerprint, Iris Palm, and Voice. Ed. by bayometric.com. https://www.bayometric.com/biometricsface-finger-iris-palm-voice/ (dostęp: 10.09.2018).
Google Scholar
TrendForce. Penetracja rynkowa smartfonów z czujnikami linii papilarnych 2018. https://press.trendforce.com/press/201801113049.html (dostęp: 10.09.2018).
Google Scholar
Uryniuk J., Ąlior, ING i SGB wycofują z oferty płatności mobilne NFC. Usługa będzie dostępna już tylko w dwóch bankach, https://www.cashless. pl/wiadomosci/platnosci-mobilne/2174-alior-ing-isgb-wycofuja-z-oferty-platnosci-mobilne-nfc-uslugabedzie-dostepna-juz-tylko-w-dwoch-bankach (dostęp: 10.09.2018).
Google Scholar
Visa – Digital Payments Study 2017. https://www.visa.pl/o-nas/ aktualnosci/upowszechnienie-pieniadza-mobilnego-wpolsce-77-percent-badanych-uzywa-smartfonow-dobankowania-i-codziennych-platnosci-2190949 (dostęp: 10.09.2018).
Google Scholar
Visa. Visa – Digital Payments Study 2017 ikonografika. https://www.visa. pl/o-nas/aktualnosci/infografika-digital-paymentsstudy-2017-71231 (dostęp: 10.09.2018).
Google Scholar
Visa. European consumers ready to use biometrics for securing payments 2017. https://www.visaeurope.com/newsroom/news/european-consumers-ready-for-biometrics (dostęp: 10.09.2018).
Google Scholar