메뉴 건너뛰기




Volumn 27, Issue 1-2, 2008, Pages 3-11

Improvement of keystroke data quality through artificial rhythms and cues

Author keywords

Artificial rhythms; Cues; Data quality; Keystroke dynamics; Password authentication

Indexed keywords

AUTHENTICATION;

EID: 44849117259     PISSN: 01674048     EISSN: None     Source Type: Journal    
DOI: 10.1016/j.cose.2008.02.001     Document Type: Article
Times cited : (30)

References (13)
  • 2
    • 0027001391 scopus 로고    scopus 로고
    • Bleha SA, Knopp J, Obaidat MS. Performance of the perceptron algorithm for the classification of computer users. In: Proceedings of the 1992 ACM/SIGAPP symposium on applied computing: technological challenges of the 1990's; 1992. p. 863-6.
    • Bleha SA, Knopp J, Obaidat MS. Performance of the perceptron algorithm for the classification of computer users. In: Proceedings of the 1992 ACM/SIGAPP symposium on applied computing: technological challenges of the 1990's; 1992. p. 863-6.
  • 5
    • 33744950220 scopus 로고    scopus 로고
    • Artificial rhythms and cues for keystroke dynamics based authentication
    • Cho S., and Hwang S. Artificial rhythms and cues for keystroke dynamics based authentication. Lecture Notes in Computer Science 3832 (2006) 626-632
    • (2006) Lecture Notes in Computer Science , vol.3832 , pp. 626-632
    • Cho, S.1    Hwang, S.2
  • 7
    • 0036276843 scopus 로고    scopus 로고
    • Acceptance of subscriber authentication methods for mobile telephony devices
    • Clarke N.L., Furnell S.M., Rodwell P.M., and Reynolds P.L. Acceptance of subscriber authentication methods for mobile telephony devices. Computers and Security 21 3 (2002) 220-228
    • (2002) Computers and Security , vol.21 , Issue.3 , pp. 220-228
    • Clarke, N.L.1    Furnell, S.M.2    Rodwell, P.M.3    Reynolds, P.L.4
  • 10
    • 0029192188 scopus 로고    scopus 로고
    • Obaidat MS. A verification methodology for computer systems users. In: Proceedings of the 1995 ACM symposium on applied computing; 1995. p. 258-62.
    • Obaidat MS. A verification methodology for computer systems users. In: Proceedings of the 1995 ACM symposium on applied computing; 1995. p. 258-62.
  • 11
    • 12844274372 scopus 로고    scopus 로고
    • Typing patterns: a key to user identification
    • Peacock A., Ke X., and Wilkerson M. Typing patterns: a key to user identification. IEEE Security and Privacy 2 5 (2004) 40-47
    • (2004) IEEE Security and Privacy , vol.2 , Issue.5 , pp. 40-47
    • Peacock, A.1    Ke, X.2    Wilkerson, M.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.