-
1
-
-
13244284703
-
User authentication through typing biometrics features
-
DOI 10.1109/TSP.2004.839903
-
Araújo, L.C.F., Sucupira, L.H.R., Lizárraga, M.G., Ling, L.L., Yabu-Uti, J.B.T., 2005. User authentication through typing biometrics features. IEEE Transactions on Signal Processing 53, 851-855. (Pubitemid 40181779)
-
(2005)
IEEE Transactions on Signal Processing
, vol.53
, Issue.2
, pp. 851-855
-
-
Araujo, L.C.F.1
Sucupira Jr., L.H.R.2
Lizarraga, M.G.3
Ling, L.L.4
Yabu-Uti, J.B.T.5
-
2
-
-
78650165017
-
User authentication through keystroke dynamics
-
Bergadano, F., Gunetti, D., Picardi, C, 2002. User authentication through keystroke dynamics. ACM Transactions on Information and System Security 5, 367-397.
-
(2002)
ACM Transactions on Information and System Security
, vol.5
, pp. 367-397
-
-
Bergadano, F.1
Gunetti, D.2
Picardi, C.3
-
3
-
-
0025541584
-
Computer-access security systems using keystroke dynamics
-
Bleha, S.A., Slivinsky, C, Hussien, B., 1990. Computer-access security systems using keystroke dynamics. IEEE Transactions on Pattern Analysis and Machine Intelligence 12, 1217-1222.
-
(1990)
IEEE Transactions on Pattern Analysis and Machine Intelligence
, vol.12
, pp. 1217-1222
-
-
Bleha, S.A.1
Slivinsky, C.2
Hussien, B.3
-
5
-
-
57949084072
-
Authentication personal
-
Boechat, G.C., Ferreira, J.C., Filho, E.C.B.C, 2007. Authentication personal. In: IEEE International Conference on Intelligent and Advanced Systems, pp. 254-256.
-
(2007)
IEEE International Conference on Intelligent and Advanced Systems
, pp. 254-256
-
-
Boechat, G.C.1
Ferreira, J.C.2
Filho, E.C.B.C.3
-
7
-
-
67651146720
-
User authentication using keystroke dynamics for cellular phones
-
Campisi, P., Maiorana, E., Bosco, M.L., Neri, A., 2009. User authentication using keystroke dynamics for cellular phones. IET Signal Processing 3, 333-341.
-
(2009)
IET Signal Processing
, vol.3
, pp. 333-341
-
-
Campisi, P.1
Maiorana, E.2
Bosco, M.L.3
Neri, A.4
-
8
-
-
85030494985
-
A simple keystroke dynamics-based authentication system using means and standard deviation
-
in press
-
Chang, T.Y., Yang, Y.J. A simple keystroke dynamics-based authentication system using means and standard deviation. Journal of Internet Technology, in press.
-
Journal of Internet Technology
-
-
Chang, T.Y.1
Yang, Y.J.2
-
9
-
-
77953251280
-
A personalized rhythm click-based authentication system
-
Chang, T.Y., Yang, Y.J., Peng, C.C., 2010. A personalized rhythm click-based authentication system. Information Management and Computer Security 18, 72-85.
-
(2010)
Information Management and Computer Security
, vol.18
, pp. 72-85
-
-
Chang, T.Y.1
Yang, Y.J.2
Peng, C.C.3
-
11
-
-
33847652928
-
Advanced user authentication for mobile devices
-
DOI 10.1016/j.cose.2006.08.008, PII S0167404806001428
-
Clarke, N.L., Furnell, S.M., 2007a. Advanced user authentication for mobile devices. Computers & Security 26, 109-119. (Pubitemid 46367239)
-
(2007)
Computers and Security
, vol.26
, Issue.2
, pp. 109-119
-
-
Clarke, N.L.1
Furnell, S.M.2
-
12
-
-
33845701766
-
Authenticating mobile phone users using keystroke analysis
-
DOI 10.1007/s10207-006-0006-6
-
Clarke, N.L., Furnell, S.M., 2007b. Authenticating mobile phone users using keystroke analysis. International Journal of Information Security 6, 1-14. (Pubitemid 44963965)
-
(2007)
International Journal of Information Security
, vol.6
, Issue.1
, pp. 1-14
-
-
Clarke, N.L.1
Furnell, S.M.2
-
14
-
-
33646023117
-
An introduction to ROC analysis
-
Fawcett, T., 2006. An introduction to ROC analysis. Pattern Recognition Letters 27, 861-874.
-
(2006)
Pattern Recognition Letters
, vol.27
, pp. 861-874
-
-
Fawcett, T.1
-
15
-
-
0343700185
-
-
Rand Report R-256-NSF. Rand Corporation
-
Gaines, R.S., Lisowski, W., Press, S., Shapiro, N., 1980. Authentication by keystroke timing: some preliminary results. In: Rand Report R-256-NSF. Rand Corporation.
-
(1980)
Authentication by Keystroke Timing: Some Preliminary Results
-
-
Gaines, R.S.1
Lisowski, W.2
Press, S.3
Shapiro, N.4
-
16
-
-
80051791613
-
Unconstrained keystroke dynamics authentication with shared secret
-
Giot, R., El-Abed, M., Hemery, B., Rosenberger, C, 2011. Unconstrained keystroke dynamics authentication with shared secret. Computers & Security 30, 427-445.
-
(2011)
Computers & Security
, vol.30
, pp. 427-445
-
-
Giot, R.1
El-Abed, M.2
Hemery, B.3
Rosenberger, C.4
-
17
-
-
0034497380
-
Multi-technique approach for user identification through keystroke dynamics
-
Haider, S., Abbas, A., Zaidi, A.K., 2000. A multi-technique approach for user identification through keystroke dynamics. In: IEEE International Conference on System, Man, and Cybernetics, pp. 1336-1341. (Pubitemid 32069225)
-
(2000)
Proceedings of the IEEE International Conference on Systems, Man and Cybernetics
, vol.2
, pp. 1336-1341
-
-
Haider Sajjad1
Abbas Ahmed2
Zaidi Abbas, K.3
-
18
-
-
77957822108
-
Performance of keystroke biometrics authentication system using artificial neural network (ann) and distance classifier method
-
Harun, N., Woo, W.L., Dlay, S.S., 2010. Performance of keystroke biometrics authentication system using artificial neural network (ann) and distance classifier method. In: International Conference on Computer and Communication Engineering (ICCCE), pp. 1-6.
-
(2010)
International Conference on Computer and Communication Engineering (ICCCE)
, pp. 1-6
-
-
Harun, N.1
Woo, W.L.2
Dlay, S.S.3
-
19
-
-
79951887821
-
The security analysis of graphical passwords
-
Hu, W., Wu, X.P., Wei, G.H., 2010. The security analysis of graphical passwords. In: 2010 International Conference on Communications and Intelligence Information Security, pp. 200-203.
-
(2010)
2010 International Conference on Communications and Intelligence Information Security
, pp. 200-203
-
-
Hu, W.1
Wu, X.P.2
Wei, G.H.3
-
20
-
-
57849163559
-
Keystroke dynamics-based authentication for mobile devices
-
Hwang, S., Cho, S., Park, S., 2009a. Keystroke dynamics-based authentication for mobile devices. Computers & Security 28, 85-93.
-
(2009)
Computers & Security
, vol.28
, pp. 85-93
-
-
Hwang, S.1
Cho, S.2
Park, S.3
-
21
-
-
67349185024
-
Improving authentication accuracy using artificial rhythms and cues for keystroke dynamics-based authentication
-
Hwang, S., Lee, H., Cho, S., 2009b. Improving authentication accuracy using artificial rhythms and cues for keystroke dynamics-based authentication. Expert Systems with Applications 36, 10649-10656.
-
(2009)
Expert Systems with Applications
, vol.36
, pp. 10649-10656
-
-
Hwang, S.1
Lee, H.2
Cho, S.3
-
24
-
-
85084161999
-
The design and analysis of graphical passwords
-
Jermyn, I., Mayer, A., Monrose, F., Reiter, M.K., Rubin, A.D., 1999. The design and analysis of graphical passwords. In: 8th USENIX Security Symposium.
-
(1999)
8th USENIX Security Symposium
-
-
Jermyn, I.1
Mayer, A.2
Monrose, F.3
Reiter, M.K.4
Rubin, A.D.5
-
28
-
-
33744949030
-
Enhancing login security through the use of keystroke input dynamics
-
Advances in Biometrics - International Conference, ICB 2006, Proceedings
-
Revett, K., de Magalháes, S.T., Santos, H.M.D., 2005. Enhancing login security through the use of keystroke input dynamics. In: Advances in Biometrics, Lecture Notes in Computer Science 3832, pp. 661-667. (Pubitemid 43856431)
-
(2006)
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
, vol.3832
, pp. 661-667
-
-
Revett, K.1
De Magalhaes, S.T.2
Santos, H.M.D.3
-
29
-
-
0031275601
-
Enhanced password authentication through fuzzy logic
-
Ru, W.G.D., Eloff, J.H.P., 1997. Enhanced password authentication through fuzzy logic. IEEE Expert: Intelligent Systems and Their Applications 12, 38-45. (Pubitemid 127802496)
-
(1997)
IEEE Expert-Intelligent Systems and their Applications
, vol.12
, Issue.6
, pp. 38-45
-
-
De Ru, W.G.1
Eloff, J.H.P.2
-
30
-
-
62949238252
-
User authentication using combination of behavioral biometrics over the touchpad acting like touch screen of mobile device
-
Saevanee, H., Bhatarakosol, P., 2008. User authentication using combination of behavioral biometrics over the touchpad acting like touch screen of mobile device. In: Computer and Electrical Engineering, pp. 82-86.
-
(2008)
Computer and Electrical Engineering
, pp. 82-86
-
-
Saevanee, H.1
Bhatarakosol, P.2
-
33
-
-
84956859871
-
A user identification system using signature written with mouse
-
Syukri, A.F., Okamoto, E., Mambo, M., 1998. A user identification system using signature written with mouse. In: 3rd Australasian Conference on Information Security and Privacy, pp. 403-441.
-
(1998)
3rd Australasian Conference on Information Security and Privacy
, pp. 403-441
-
-
Syukri, A.F.1
Okamoto, E.2
Mambo, M.3
-
34
-
-
35248891741
-
Authentication using graphical passwords: Basic results
-
Wiedenbeck, S., Waters, J., Birget, J.C., Brodskiy, A., Memon, N., 2005a. Authentication using graphical passwords: basic results. In: 11th Human-Computer Interaction International (HCII).
-
(2005)
11th Human-Computer Interaction International (HCII)
-
-
Wiedenbeck, S.1
Waters, J.2
Birget, J.C.3
Brodskiy, A.4
Memon, N.5
-
35
-
-
19944381937
-
PassPoints: Design and longitudinal evaluation of a graphical password system
-
DOI 10.1016/j.ijhcs.2005.04.010, PII S1071581905000625, HCI Research in Privacy and Security
-
Wiedenbeck, S., Waters, J., Birget, J.C., Brodskiy, A., Memon, N., 2005b. Passpoints: design and longitudinalevaluationofagraphical password system. International Journal of Human-Computer Studies 63, 102-127. (Pubitemid 40753495)
-
(2005)
International Journal of Human Computer Studies
, vol.63
, Issue.1-2
, pp. 102-127
-
-
Wiedenbeck, S.1
Waters, J.2
Birget, J.-C.3
Brodskiy, A.4
Memon, N.5
-
36
-
-
80053547959
-
Correlation keystroke verification scheme for user access control in cloud computing environment
-
Xi, K., Tang, Y., Hu, J., 2011. Correlation keystroke verification scheme for user access control in cloud computing environment. The Computer Journal 54, 1632-1644.
-
(2011)
The Computer Journal
, vol.54
, pp. 1632-1644
-
-
Xi, K.1
Tang, Y.2
Hu, J.3
|