메뉴 건너뛰기




Volumn 6, Issue 2, 2011, Pages 347-356

A novel and simple statistical fusion method for user authentication through keystroke features

Author keywords

Biometrics; Keystroke dynamics; Statistics; User authentication

Indexed keywords

FALSE ACCEPTANCE RATE; FALSE REJECTION RATE; FUSION METHODS; KEYSTROKE DYNAMICS; LEGITIMATE USERS; PASSWORD-BASED AUTHENTICATION; TIME INSTANCES; TIME-PERIODS; USER AUTHENTICATION;

EID: 79952379784     PISSN: 19759320     EISSN: None     Source Type: Journal    
DOI: 10.4156/jcit.vol6.issue2.35     Document Type: Article
Times cited : (3)

References (33)
  • 5
    • 0026121425 scopus 로고
    • Dimensionality reduction and feature extraction applications in identifying computer users
    • S. A. Bleha and M. S. Obaidat, "Dimensionality reduction and feature extraction applications in identifying computer users", IEEE Transactions on System, Man, and Cybernetics, vol. 21, no. 2, pp.452-456, 1991.
    • (1991) IEEE Transactions On System, Man, and Cybernetics , vol.21 , Issue.2 , pp. 452-456
    • Bleha, S.A.1    Obaidat, M.S.2
  • 10
    • 18444399366 scopus 로고    scopus 로고
    • Simple authenticated key agreement and protected password change protocol
    • T. Y. Chang, W. P. Yang, and M. S. Hwang, "Simple authenticated key agreement and protected password change protocol", Computers & Mathematics with Applications, vol. 49, no. 5-6, pp.703-714, 2005.
    • (2005) Computers & Mathematics With Applications , vol.49 , Issue.5-6 , pp. 703-714
    • Chang, T.Y.1    Yang, W.P.2    Hwang, M.S.3
  • 12
    • 38049049380 scopus 로고    scopus 로고
    • Keystroke dynamics for biometrics identification
    • , Lecture Notes in Computer Science
    • M. Choras and P. Mroczkowski, "Keystroke dynamics for biometrics identification", in Adaptive and Natural Computing Algorithm}, pp.424-431, Lecture Notes in Computer Science 4432, 2007.
    • (2007) Adaptive and Natural Computing Algorithm , vol.4432 , pp. 424-431
    • Choras, M.1    Mroczkowski, P.2
  • 14
    • 33745198933 scopus 로고    scopus 로고
    • Keystroke analysis of different languages: A case study
    • Lecture Notes in Computer Science
    • D. Gunetti, C. Picardi, and G. Ruffo, "Keystroke analysis of different languages: A case study", in Advances in Intelligent Data Analysis VI, pp.133-144, Lecture Notes in Computer Science 3646, 2005.
    • (2005) Advances In Intelligent Data Analysis VI , vol.3646 , pp. 133-144
    • Gunetti, D.1    Picardi, C.2    Ruffo, G.3
  • 16
    • 37849023553 scopus 로고    scopus 로고
    • User classification for keystroke dynamics authentication
    • Lecture Notes in Computer Science
    • S. Hocquet, J. Y. Ramel, and H. Cardot, "User classification for keystroke dynamics authentication", in Advances in Biometrics, pp.531-539, Lecture Notes in Computer Science 4642, 2007.
    • (2007) Advances In Biometrics , vol.4642 , pp. 531-539
    • Hocquet, S.1    Ramel, J.Y.2    Cardot, H.3
  • 20
    • 0025384135 scopus 로고
    • Identity authentication based on keystroke latencies
    • R. Joyce and G. Gupta, "Identity authentication based on keystroke latencies", Commun. ACM, vol. 33, no. 2, pp.168-176, 1990.
    • (1990) Commun. ACM , vol.33 , Issue.2 , pp. 168-176
    • Joyce, R.1    Gupta, G.2
  • 21
    • 34249913467 scopus 로고    scopus 로고
    • Retraining a keystroke dynamics-based authenticator with impostor patterns
    • H. Lee and S. Cho, "Retraining a keystroke dynamics-based authenticator with impostor patterns", Computers & Security, vol. 26, no. 4, pp.300-310, 2006.
    • (2006) Computers & Security , vol.26 , Issue.4 , pp. 300-310
    • Lee, H.1    Cho, S.2
  • 22
    • 38049180651 scopus 로고    scopus 로고
    • Keystroke pressure-based typing biometrics authentication system using support vector machines
    • Lecture Notes in Computer Science
    • W. Martono, H. Ali, and M. J. E. Salami, "Keystroke pressure-based typing biometrics authentication system using support vector machines," in Computational Science and Its Applications, pp.85-93, Lecture Notes in Computer Science 4706, 2007.
    • (2007) Computational Science and Its Applications , vol.4706 , pp. 85-93
    • Martono, W.1    Ali, H.2    Salami, M.J.E.3
  • 23
    • 0034140431 scopus 로고    scopus 로고
    • Keystroke dynamics as a biometric for authentication
    • F. Monrose and A. D. Rubin, "Keystroke dynamics as a biometric for authentication", Future Generation Computer Systems, vol. 16, no. 4, pp.351-359, 2000.
    • (2000) Future Generation Computer Systems , vol.16 , Issue.4 , pp. 351-359
    • Monrose, F.1    Rubin, A.D.2
  • 24
    • 0028423041 scopus 로고
    • A multilayer neural network system for computer access security
    • M. S. Obaidat and S. Member, "A multilayer neural network system for computer access security", IEEE Transactions on System, Man, and Cybernetics, vol. 24, no. 5, pp.806-813, 1994.
    • (1994) IEEE Transactions On System, Man, and Cybernetics , vol.24 , Issue.5 , pp. 806-813
    • Obaidat, M.S.1    Member, S.2
  • 27
    • 33744949030 scopus 로고    scopus 로고
    • Enhancing login security through the use of keystroke input dynamics
    • Lecture Notes in Computer Science
    • K. Revett, S. T. de Magalhães, and H. M. D. Santos, "Enhancing login security through the use of keystroke input dynamics", in Advances in Biometrics, pp.661-667, Lecture Notes in Computer Science 3832, 2005.
    • (2005) Advances In Biometrics , vol.3832 , pp. 661-667
    • Revett, K.1    de Magalhães, S.T.2    Santos, H.M.D.3
  • 28
    • 38349018230 scopus 로고    scopus 로고
    • On the use of rough sets for user authentication via keystroke dynamics
    • Lecture Notes in Computer Science
    • K. Revett, S. T. de Magalhães, and H. M. D. Santos, "On the use of rough sets for user authentication via keystroke dynamics", in Progress in Artificial Intelligence, pp.145-159, Lecture Notes in Computer Science 4874, 2007.
    • (2007) Progress In Artificial Intelligence , vol.4874 , pp. 145-159
    • Revett, K.1    de Magalhães, S.T.2    Santos, H.M.D.3
  • 31
  • 32
    • 79952433568 scopus 로고    scopus 로고
    • Improvement on a Password Authentication Scheme for Multi-server Environments
    • Z. Tan, "Improvement on a Password Authentication Scheme for Multi-server Environments," JCIT: Journal of Convergence Information Technology, vol. 6, no. 1, pp. 218-228, 2011.
    • (2011) JCIT: Journal of Convergence Information Technology , vol.6 , Issue.1 , pp. 218-228
    • Tan, Z.1
  • 33
    • 79952424939 scopus 로고    scopus 로고
    • Cryptanalysis of Two ID Based Password Authentication Schemes for Multi-server Environments
    • Z. Tan, Cryptanalysis of Two ID Based Password Authentication Schemes for Multi-server Environments, JDCTA: International Journal of Digital Content Technology and its Applications, vol. 5, no. 1, pp. 87-94, 2011.
    • (2011) JDCTA: International Journal of Digital Content Technology and Its Applications , vol.5 , Issue.1 , pp. 87-94
    • Tan, Z.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.