-
2
-
-
79952697017
-
On the discriminability of keystroke feature vectors used in fixed text keystroke authentication
-
Feb.
-
K. S. Balagani, V. V. Phoha, A. Ray, and S. Phoha. On the discriminability of keystroke feature vectors used in fixed text keystroke authentication. Pattern Recognition Letters, Feb. 2011.
-
(2011)
Pattern Recognition Letters
-
-
Balagani, K.S.1
Phoha, V.V.2
Ray, A.3
Phoha, S.4
-
6
-
-
56049086396
-
Gaussian mixture modeling of keystroke patterns for biometric applications. Systems, Man, and Cybernetics, Part C: Applications and Reviews
-
D. Hosseinzadeh and S. Krishnan. Gaussian mixture modeling of keystroke patterns for biometric applications. Systems, Man, and Cybernetics, Part C: Applications and Reviews, IEEE Transactions on, 38(6):816-826, 2008.
-
(2008)
IEEE Transactions on
, vol.38
, Issue.6
, pp. 816-826
-
-
Hosseinzadeh, D.1
Krishnan, S.2
-
8
-
-
0025384135
-
Identity authentication based on keystroke latencies
-
DOI 10.1145/75577.75582
-
R. Joyce and G. Gupta. Identity authentication based on keystroke latencies. Commun. ACM, 33:168-176, February 1990. (Pubitemid 20657223)
-
(1990)
Communications of the ACM
, vol.33
, Issue.2
, pp. 168-176
-
-
Joyce, R.1
Gupta, G.2
-
10
-
-
56549092419
-
The effect of clock resolution on keystroke dynamics
-
Recent Advances in Intrusion Detection Springer-Verlag
-
K. Killourhy and R. Maxion. The effect of clock resolution on keystroke dynamics. In Recent Advances in Intrusion Detection, volume 5230/2008 of Lecture Notes in Computer Science, pages 331-350. Springer-Verlag, 2008.
-
(2008)
Lecture Notes in Computer Science
, vol.5230
, Issue.2008
, pp. 331-350
-
-
Killourhy, K.1
Maxion, R.2
-
11
-
-
70450014575
-
Comparing anomaly-detection algorithms for keystroke dynamics
-
K. S. Killourhy and R. A. Maxion. Comparing anomaly-detection algorithms for keystroke dynamics. In DSN, pages 125-134, 2009.
-
(2009)
DSN
, pp. 125-134
-
-
Killourhy, K.S.1
Maxion, R.A.2
-
13
-
-
0041108231
-
Dynamic identity verification via keystroke characteristics
-
J. J. Leggett, G. Williams, M. Usnick, and M. Longnecker. Dynamic identity verification via keystroke characteristics. International Journal of Man-Machine Studies, 35(6):859-870, 1991.
-
(1991)
International Journal of Man-Machine Studies
, vol.35
, Issue.6
, pp. 859-870
-
-
Leggett, J.J.1
Williams, G.2
Usnick, M.3
Longnecker, M.4
-
14
-
-
79959321460
-
Keystroke dynamics authentication for mobile phones
-
New York, NY, USA, ACM
-
E. Maiorana, P. Campisi, N. González-Carballo, and A. Neri. Keystroke dynamics authentication for mobile phones. In Proceedings of the 2011 ACM Symposium on Applied Computing, SAC '11, pages 21-26, New York, NY, USA, 2011. ACM.
-
(2011)
Proceedings of the 2011 ACM Symposium on Applied Computing, SAC '11
, pp. 21-26
-
-
Maiorana, E.1
Campisi, P.2
González-Carballo, N.3
Neri, A.4
-
16
-
-
33745788833
-
Fast dictionary attacks on passwords using time-space tradeoff
-
New York, NY, USA, ACM
-
A. Narayanan and V. Shmatikov. Fast dictionary attacks on passwords using time-space tradeoff. In Proceedings of the 12th ACM conference on Computer and communications security, CCS '05, pages 364-372, New York, NY, USA, 2005. ACM.
-
(2005)
Proceedings of the 12th ACM Conference on Computer and Communications Security, CCS '05
, pp. 364-372
-
-
Narayanan, A.1
Shmatikov, V.2
-
17
-
-
12844274372
-
Typing patterns: A key to user identification
-
DOI 10.1109/MSP.2004.89
-
A. Peacock, X. Ke, and M. Wilkerson. Typing patterns: A key to user identification. IEEE Security and Privacy, 2:40-47, 2004. (Pubitemid 40168625)
-
(2004)
IEEE Security and Privacy
, vol.2
, Issue.5
, pp. 40-47
-
-
Peacock, A.1
Ke, X.2
Wilkerson, M.3
-
18
-
-
0034809453
-
Enhancing security and privacy in biometrics-based authentication systems
-
March
-
N. K. Ratha, J. H. Connell, and R. M. Bolle. Enhancing security and privacy in biometrics-based authentication systems. IBM Syst. J., 40:614-634, March 2001.
-
(2001)
IBM Syst. J.
, vol.40
, pp. 614-634
-
-
Ratha, N.K.1
Connell, J.H.2
Bolle, R.M.3
-
20
-
-
0022718731
-
Perceptual, cognitive, and motoric aspects of transcription typing
-
T. A. Salthouse. Perceptual, cognitive, and motoric aspects of transcription typing. Psychological Bulletin, 99(3):303-319, 1986.
-
(1986)
Psychological Bulletin
, vol.99
, Issue.3
, pp. 303-319
-
-
Salthouse, T.A.1
-
22
-
-
85084161110
-
Timing analysis of keystrokes and timing attacks on ssh
-
Berkeley, CA, USA, USENIX Association
-
D. X. Song, D. Wagner, and X. Tian. Timing analysis of keystrokes and timing attacks on ssh. In Proceedings of the 10th conference on USENIX Security Symposium - Volume 10, pages 25-25, Berkeley, CA, USA, 2001. USENIX Association.
-
(2001)
Proceedings of the 10th Conference on USENIX Security Symposium
, vol.10
, pp. 25-25
-
-
Song, D.X.1
Wagner, D.2
Tian, X.3
-
23
-
-
78650022232
-
Testing metrics for password creation policies by attacking large sets of revealed passwords
-
New York, NY, USA, ACM
-
M. Weir, S. Aggarwal, M. Collins, and H. Stern. Testing metrics for password creation policies by attacking large sets of revealed passwords. In Proceedings of the 17th ACM conference on Computer and communications security, CCS '10, pages 162-175, New York, NY, USA, 2010. ACM.
-
(2010)
Proceedings of the 17th ACM Conference on Computer and Communications Security, CCS '10
, pp. 162-175
-
-
Weir, M.1
Aggarwal, S.2
Collins, M.3
Stern, H.4
-
24
-
-
78650011800
-
The security of modern password expiration: An algorithmic framework and empirical analysis
-
New York, NY, USA, ACM
-
Y. Zhang, F. Monrose, and M. K. Reiter. The security of modern password expiration: an algorithmic framework and empirical analysis. In Proceedings of the 17th ACM conference on Computer and communications security, CCS '10, pages 176-186, New York, NY, USA, 2010. ACM.
-
(2010)
Proceedings of the 17th ACM Conference on Computer and Communications Security, CCS '10
, pp. 176-186
-
-
Zhang, Y.1
Monrose, F.2
Reiter, M.K.3
|