메뉴 건너뛰기




Volumn 4, Issue 1, 2010, Pages 32-60

A keystroke biometric system for long-text input

Author keywords

Behavioral biometrics; Biometrics; Keystroke biometric; User authentication; User identification

Indexed keywords

BIOMETRICS; HIERARCHICAL SYSTEMS;

EID: 78650286294     PISSN: 19301650     EISSN: 19301669     Source Type: Journal    
DOI: 10.4018/jisp.2010010103     Document Type: Article
Times cited : (32)

References (35)
  • 1
    • 84865158402 scopus 로고    scopus 로고
    • AdmitOne Security Inc, Retrieved from
    • AdmitOne Security Inc. (2008). Home. Retrieved from http://www. admitonesecurity.com/
    • (2008) Home
  • 4
    • 84865155449 scopus 로고    scopus 로고
    • Retrieved from
    • BioChec. (2008). Home. Retrieved from http://www.biochec.com/
    • (2008) Home
  • 6
    • 0039921279 scopus 로고
    • User identification via keystroke characteristics of typed names using neural networks
    • doi:10.1006/imms.1993.1092
    • Brown, M., & Rogers, S. J. (1993). User identification via keystroke characteristics of typed names using neural networks. International Journal of Man-Machine Studies, 39(6), 999-1014. doi:10.1006/imms.1993.1092
    • (1993) International Journal of Man-machine Studies , vol.39 , Issue.6 , pp. 999-1014
    • Brown, M.1    Rogers, S.J.2
  • 10
    • 36048978381 scopus 로고    scopus 로고
    • The problems of using ROC curve as the sole criterion in positive biometrics identification
    • Du, Y., & Chang, C.-I. (2007). The problems of using ROC curve as the sole criterion in positive biometrics identification. In Proceedings of SPIE 6579.
    • (2007) Proceedings of SPIE 6579
    • Du, Y.1    Chang, C.-I.2
  • 16
    • 33745215614 scopus 로고    scopus 로고
    • Keystroke analysis of free text
    • DOI 10.1145/1085126.1085129
    • Gunetti, D., & Picardi, C. (2005). Keystroke analysis of free text. ACM Transactions on Information and System Security, 8(3), 312-347. doi:10.1145/1085126.1085129 (Pubitemid 43906388)
    • (2005) ACM Transactions on Information and System Security , vol.8 , Issue.3 , pp. 312-347
    • Gunetti, D.1    Picardi, C.2
  • 19
    • 0023843707 scopus 로고
    • Verifying identity via keystroke characteristics
    • Leggett, J., & Williams, G. (1988). Verifying identity via keystroke characteristics. International Journal of Man-Machine Studies, 28(1), 67-76. doi:10.1016/S0020-7373 (88) 80053-1 (Pubitemid 18653526)
    • (1988) International Journal of Man-Machine Studies , vol.28 , Issue.1 , pp. 67-76
    • Leggett John1    Williams Glen2
  • 20
    • 0041108231 scopus 로고
    • Dynamic identity verification via keystroke characteristics
    • doi:10.1016/S0020-7373 05 80165-8
    • Leggett, J., Williams, G., Usnick, M., & Longnecker, M. (1991). Dynamic identity verification via keystroke characteristics. International Journal of Man-Machine Studies, 35(6), 859-870. doi:10.1016/S0020-7373 (05) 80165-8
    • (1991) International Journal of Man-machine Studies , vol.35 , Issue.6 , pp. 859-870
    • Leggett, J.1    Williams, G.2    Usnick, M.3    Longnecker, M.4
  • 22
    • 0034140431 scopus 로고    scopus 로고
    • Keystroke dynamics as a biometric for authentication
    • DOI 10.1016/S0167-739X(99)00059-X
    • Monrose, F., & Rubin, A. D. (2000). Keystroke dynamics as a biometric for authentication. Future Generation Computer Systems, 16(4), 351-359. doi:10.1016/S0167-739X (99) 00059-X (Pubitemid 30552905)
    • (2000) Future Generation Computer Systems , vol.16 , Issue.4 , pp. 351-359
    • Monrose, F.1    Rubin, A.D.2
  • 23
    • 0042585206 scopus 로고    scopus 로고
    • Keystroke dynamics based authentication
    • Jain, A. K., Bolle, R., & Pankanti, S. Eds., New York: Springer
    • Obaidat, M. S., & Sadoun, B. (1999). Keystroke dynamics based authentication. In Jain, A. K., Bolle, R., & Pankanti, S. (Eds.), Biometrics: Personal Identification in Networked Society (pp. 213-230). New York: Springer.
    • (1999) Biometrics: Personal Identification in Networked Society , pp. 213-230
    • Obaidat, M.S.1    Sadoun, B.2
  • 24
    • 12844274372 scopus 로고    scopus 로고
    • Typing patterns: A key to user identification
    • DOI 10.1109/MSP.2004.89
    • Peacock, A., Ke, X., & Wilkerson, M. (2004). Typing patterns: A key to user identification. IEEE Security & Privacy, 2(5), 40-47. doi:10.1109/MSP.2004.89 (Pubitemid 40168625)
    • (2004) IEEE Security and Privacy , vol.2 , Issue.5 , pp. 40-47
    • Peacock, A.1    Ke, X.2    Wilkerson, M.3
  • 25
    • 77956306050 scopus 로고    scopus 로고
    • Keystroke dynamics
    • New York: Wiley, doi:10.1002/9780470997949. ch4
    • Revett, K. (2008). Keystroke dynamics. In Behavioral biometrics: A remote access approach (pp. 73-136). New York: Wiley. doi:10.1002/9780470997949. ch4
    • (2008) Behavioral Biometrics: A Remote Access Approach , pp. 73-136
    • Revett, K.1
  • 30
    • 78649285491 scopus 로고    scopus 로고
    • Keystroke biometric identification and authentication on long-text input
    • Wang, L., & Geng, X. Eds., Hershey, PA: IGI Global
    • Tappert, C. C., Villani, M., & Cha, S. (2009). Keystroke Biometric Identification and Authentication on Long-Text Input. In Wang, L., & Geng, X. (Eds.), Behavioral Biometrics for Human Identification: Intelligent Applications (pp. 342-367). Hershey, PA: IGI Global.
    • (2009) Behavioral Biometrics for Human Identification: Intelligent Applications , pp. 342-367
    • Tappert, C.C.1    Villani, M.2    Cha, S.3
  • 35
    • 3042852406 scopus 로고    scopus 로고
    • Keystroke dynamics identity verification - Its problems and practical solutions
    • doi:10.1016/j.cose.2004.02.004
    • Yu, E., & Cho, S. (2004). Keystroke dynamics identity verification - Its problems and practical solutions. Computers & Security, 23(5), 428-440. doi:10.1016/j.cose.2004.02.004
    • (2004) Computers & Security , vol.23 , Issue.5 , pp. 428-440
    • Yu, E.1    Cho, S.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.