메뉴 건너뛰기




Volumn , Issue , 2011, Pages 974-980

Privacy: Gone with the typing! Identifying web users by their typing patterns

Author keywords

[No Author keywords available]

Indexed keywords

ANONYMOUS BROWSING; INTERNET USERS; PRIVACY PROTECTION; PRIVACY RISKS; STATISTICAL DETECTION; WEB USERS;

EID: 84856194876     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/PASSAT/SocialCom.2011.197     Document Type: Conference Paper
Times cited : (18)

References (14)
  • 1
    • 84856171701 scopus 로고    scopus 로고
    • Geolocation
    • [Online], Available
    • F. Holzhauer, "Geolocation, " TU Berlin, Tech. Rep., 2007. [Online]. Available: http://www.net.t-labs.tu-berlin.de/teaching/ss07/IMseminar/ aab1.pdf.
    • (2007) TU Berlin, Tech. Rep.
    • Holzhauer, F.1
  • 2
    • 79955586500 scopus 로고    scopus 로고
    • How unique is your web browser?
    • [Online], Available
    • P. Eckersley, "How unique is your web browser?" Electronics Frontier Foundation, Tech. Rep., 2009. [Online]. Available: https:// panopticlick.eff.org/browser-uniqueness.pdf.
    • (2009) Electronics Frontier Foundation, Tech. Rep.
    • Eckersley, P.1
  • 3
    • 84882750204 scopus 로고    scopus 로고
    • An analysis of private browsing modes in modern browsers
    • Washington, D.C. USA
    • G. Aggarwal, E. Bursztein, C. Jackson, and D. Boneh, "An analysis of private browsing modes in modern browsers, " in USENIX Security'10, Washington, D.C., USA, 2010.
    • (2010) USENIX Security'10
    • Aggarwal, G.1    Bursztein, E.2    Jackson, C.3    Boneh, D.4
  • 5
    • 84856172670 scopus 로고    scopus 로고
    • Tech. Rep., [Online]. Available
    • Mozilla, "Fingerprinting, " Tech. Rep., 2010. [Online]. Available: https://wiki.mozilla.org/Fingerprinting.
    • (2010) Fingerprinting
  • 6
    • 62349125999 scopus 로고    scopus 로고
    • The urgency for effective user privacy-education to counter social engineering attacks on secure computer systems
    • Salt Lake City, UT, USA
    • G. L. Orgill, G. W. Romney, M. G. Bailey, and P. M. Orgill, "The urgency for effective user privacy-education to counter social engineering attacks on secure computer systems, " in CITC5'04, Salt Lake City, UT, USA, 2004.
    • (2004) CITC5'04
    • Orgill, G.L.1    Romney, G.W.2    Bailey, M.G.3    Orgill, P.M.4
  • 8
    • 12844274372 scopus 로고    scopus 로고
    • Typing patterns: A key to user identification
    • DOI 10.1109/MSP.2004.89
    • A. Peacock, X. Ke, and M. Wilkerson, "Typing patterns: A key to user identification, " IEEE Security and Privacy, vol. 2, pp. 40-47, 2004. (Pubitemid 40168625)
    • (2004) IEEE Security and Privacy , vol.2 , Issue.5 , pp. 40-47
    • Peacock, A.1    Ke, X.2    Wilkerson, M.3
  • 9
    • 0030675109 scopus 로고    scopus 로고
    • Authentication via keystroke dynamics
    • Zurich, Switzerland
    • F. Monrose and A. D. Rubin, "Authentication via keystroke dynamics, " in CCS'97, Zurich, Switzerland, 1997.
    • (1997) CCS'97
    • Monrose, F.1    Rubin, A.D.2
  • 10
    • 33845701766 scopus 로고    scopus 로고
    • Authenticating mobile phone users using keystroke analysis
    • December
    • N. L. Clarke and S. M. Furnell, "Authenticating mobile phone users using keystroke analysis, " Int. J. Inf. Secur., vol. 6, December 2006.
    • (2006) Int. J. Inf. Secur. , vol.6
    • Clarke, N.L.1    Furnell, S.M.2
  • 11
    • 85084161110 scopus 로고    scopus 로고
    • Timing analysis of keystrokes and timing attacks on SSH
    • Washington, D.C. USA
    • D. X. Song, D. Wagner, and X. Tian, "Timing analysis of keystrokes and timing attacks on SSH, " in USENIX Security'01, Washington, D.C., USA, 2001.
    • (2001) USENIX Security'01
    • Song, D.X.1    Wagner, D.2    Tian, X.3
  • 12
    • 0023843707 scopus 로고
    • Verifying identity via keystroke characteristics
    • January
    • J. Leggett and G. Williams, "Verifying identity via keystroke characteristics, " Int. J. Man-Mach. Stud., vol. 28, January 1988.
    • (1988) Int. J. Man-Mach. Stud. , vol.28
    • Leggett, J.1    Williams, G.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.