메뉴 건너뛰기




Volumn 2, Issue 5, 2004, Pages 40-47

Typing patterns: A key to user identification

Author keywords

[No Author keywords available]

Indexed keywords

BIOMETRICS; PASSWORD-BASED ACCESS SYSTEMS; USER AUTHENTICATION; USER IDENTIFICATION;

EID: 12844274372     PISSN: 15407993     EISSN: None     Source Type: Journal    
DOI: 10.1109/MSP.2004.89     Document Type: Review
Times cited : (202)

References (25)
  • 1
    • 84860086636 scopus 로고    scopus 로고
    • Gates predicts death of the password
    • Feb.
    • M. Kotadia, "Gates Predicts Death of the Password," CNET News.com, Feb. 2004; http://msn-cnet.com/2100-1029_3-5164733.html.
    • (2004) CNET News.com
    • Kotadia, M.1
  • 2
    • 0043232732 scopus 로고    scopus 로고
    • Users are not the enemy
    • Dec.
    • A. Adams and M.A. Sasse, "Users Are Not the Enemy," Comm. ACM, vol. 42, Dec. 1999, pp. 40-46.
    • (1999) Comm. ACM , vol.42 , pp. 40-46
    • Adams, A.1    Sasse, M.A.2
  • 3
    • 12844256823 scopus 로고
    • Keyboard apparatus for personal identification
    • R. Spillane, "Keyboard Apparatus for Personal Identification," IBM Technical Disclosure Bulletin, vol. 17, no. 3346, 1975.
    • (1975) IBM Technical Disclosure Bulletin , vol.17 , Issue.3346
    • Spillane, R.1
  • 4
    • 0041108231 scopus 로고
    • Dynamic identity verification via keystroke characteristics
    • J. Leggett et al., "Dynamic Identity Verification via Keystroke Characteristics," Int'l J. Man-Machine Studies, vol. 35, no. 6, 1991, pp. 859-870.
    • (1991) Int'l J. Man-machine Studies , vol.35 , Issue.6 , pp. 859-870
    • Leggett, J.1
  • 5
    • 84860086909 scopus 로고    scopus 로고
    • Fed up with fraud
    • Apr.
    • R. Richmond, "Fed up with Fraud," The Wall Street J. Classroom Ed., Apr. 2003; www.wsjclassroomedition. com/archive/03apr/BIGB_retailer.htm/.
    • (2003) The Wall Street J. Classroom Ed.
    • Richmond, R.1
  • 6
    • 0005327658 scopus 로고    scopus 로고
    • Web-based keystroke dynamics identity verification using neural network
    • Dec.
    • S. Cho et al., "Web-Based Keystroke Dynamics Identity Verification Using Neural Network," J. Organizational Computing and Electronic Commerce, vol. 10, Dec. 2000, pp. 295-307.
    • (2000) J. Organizational Computing and Electronic Commerce , vol.10 , pp. 295-307
    • Cho, S.1
  • 7
    • 84860083885 scopus 로고    scopus 로고
    • tech. report, Escuela Técnica Superior de Informática, Univ. Autonoma de Madrid, Cantoblanco, Mar.
    • M. Tapiador and J.A. Sigüenza, Fuzzy Keystroke Biometrics on Web Security, tech. report, Escuela Técnica Superior de Informática, Univ. Autonoma de Madrid, Cantoblanco, Mar. 2000.
    • (2000) Fuzzy Keystroke Biometrics on Web Security
    • Tapiador, M.1    Sigüenza, J.A.2
  • 11
    • 0034140431 scopus 로고    scopus 로고
    • Keystroke dynamics as a biometric for authentication
    • F. Monrose and A.D. Rubin, "Keystroke Dynamics as a Biometric for Authentication," Future Generations Computing Systems, vol. 16, no. 4, 2000, pp. 351-359.
    • (2000) Future Generations Computing Systems , vol.16 , Issue.4 , pp. 351-359
    • Monrose, F.1    Rubin, A.D.2
  • 13
    • 0005237994 scopus 로고    scopus 로고
    • User authentication for key-pad-based devices using keystroke analysis
    • Inst. of Electrical Eng.
    • T. Ord and S.M. Furnell, "User Authentication for Key-pad-Based Devices Using Keystroke Analysis," Proc. 2nd Int'l Network Conf (INC 2000), Inst. of Electrical Eng., 2000, pp. 263-272.
    • (2000) Proc. 2nd Int'l Network Conf (INC 2000) , pp. 263-272
    • Ord, T.1    Furnell, S.M.2
  • 14
    • 0036040948 scopus 로고    scopus 로고
    • Advanced subscriber authentication approaches for third generation mobile systems
    • May
    • N.L. Clarke et al., "Advanced Subscriber Authentication Approaches for Third Generation Mobile Systems," 3rd Int'l Conf. 3G Mobile Comm. Technologies, vol. 489, May 2002, pp. 319-323.
    • (2002) 3rd Int'l Conf. 3G Mobile Comm. Technologies , vol.489 , pp. 319-323
    • Clarke, N.L.1
  • 17
    • 0025384135 scopus 로고
    • Identity authentication based on keystroke latencies
    • R. Joyce and G. Gupta, "Identity Authentication Based on Keystroke Latencies," Comm. ACM, vol. 33, no. 2, 1990, pp. 168-176.
    • (1990) Comm. ACM , vol.33 , Issue.2 , pp. 168-176
    • Joyce, R.1    Gupta, G.2
  • 18
    • 12844253528 scopus 로고    scopus 로고
    • tech. rep., Net Nanny Software Int'l
    • Biopassword Keystroke Dynamics, tech. rep., Net Nanny Software Int'l, 2001.
    • (2001) Biopassword Keystroke Dynamics
  • 22
    • 84860074921 scopus 로고    scopus 로고
    • tech. report, BioNet Systems
    • Biopassword: Questions and Answers, tech. report, BioNet Systems, 2002; www.biopassword.com/home/FAQs/BP_General_FAQs_112502.pdf.
    • (2002) Biopassword: Questions and Answers
  • 25
    • 85084161110 scopus 로고    scopus 로고
    • Timing analysis of keystrokes and timing attacks on SSH
    • Usenix Assoc.
    • D.X. Song, D. Wagner, and X. Tian, "Timing Analysis of Keystrokes and Timing Attacks on SSH," 10th Usenix Security Symp., Usenix Assoc., 2001; www. usenix.org/events/sec01/song.html/.
    • (2001) 10th Usenix Security Symp.
    • Song, D.X.1    Wagner, D.2    Tian, X.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.