메뉴 건너뛰기




Volumn 3832 LNCS, Issue , 2006, Pages 661-667

Enhancing login security through the use of keystroke input dynamics

Author keywords

[No Author keywords available]

Indexed keywords

COMPUTER HARDWARE; COMPUTER SOFTWARE; ELECTRONIC COMMERCE; INFORMATION ANALYSIS; INTERNET; PATTERN RECOGNITION; SECURITY OF DATA; USER INTERFACES;

EID: 33744949030     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: None     Document Type: Conference Paper
Times cited : (26)

References (11)
  • 5
    • 0141868898 scopus 로고
    • Authentication by keystroke timing: Some preliminary results
    • Rand
    • Gaines, R. et al, 1980. Authentication by keystroke timing: Some preliminary results. Rand Report R-256-NSF. Rand
    • (1980) Rand Report , vol.R-256-NSF
    • Gaines, R.1
  • 6
    • 0025384135 scopus 로고
    • Identity authorization based on keystroke latencies
    • Joyce, R. and Gupta, G., 1990. Identity authorization based on keystroke latencies. Communications of the ACM. Vol. 33(2), pp 168-176.
    • (1990) Communications of the ACM , vol.33 , Issue.2 , pp. 168-176
    • Joyce, R.1    Gupta, G.2
  • 10
    • 12844274372 scopus 로고    scopus 로고
    • Typing patterns: A key to user identification
    • IEEE, September-October
    • Alen Peacock, Xian Ke, Matthew Wilkerson. "Typing Patterns: A Key to User Identification, IEEE. Security and Privacy, vol. 02, no. 5, pp. 40-47, September-October, 2004
    • (2004) Security and Privacy , vol.2 , Issue.5 , pp. 40-47
    • Peacock, A.1    Ke, X.2    Wilkerson, M.3
  • 11
    • 33744958805 scopus 로고    scopus 로고
    • Enhancing login security using keystroke hardening and keyboard gridding
    • Revett, K. and Khan, A., 2005, Enhancing login security using keystroke hardening and keyboard gridding, Proceedings of the IADIS MCCSIS 2005.
    • (2005) Proceedings of the IADIS MCCSIS 2005
    • Revett, K.1    Khan, A.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.