메뉴 건너뛰기




Volumn 85, Issue 5, 2012, Pages 1157-1165

A graphical-based password keystroke dynamic authentication system for touch screen handheld mobile devices

Author keywords

Graphical based password authentication; Keystroke dynamics authentication; Keystroke feature; User authentication

Indexed keywords

COMPUTER KEYBOARDS; HUMAN COMPUTER INTERACTION; TOUCH SCREENS;

EID: 84862870615     PISSN: 01641212     EISSN: None     Source Type: Journal    
DOI: 10.1016/j.jss.2011.12.044     Document Type: Article
Times cited : (108)

References (36)
  • 7
    • 67651146720 scopus 로고    scopus 로고
    • User authentication using keystroke dynamics for cellular phones
    • Campisi, P., Maiorana, E., Bosco, M.L., Neri, A., 2009. User authentication using keystroke dynamics for cellular phones. IET Signal Processing 3, 333-341.
    • (2009) IET Signal Processing , vol.3 , pp. 333-341
    • Campisi, P.1    Maiorana, E.2    Bosco, M.L.3    Neri, A.4
  • 8
    • 85030494985 scopus 로고    scopus 로고
    • A simple keystroke dynamics-based authentication system using means and standard deviation
    • in press
    • Chang, T.Y., Yang, Y.J. A simple keystroke dynamics-based authentication system using means and standard deviation. Journal of Internet Technology, in press.
    • Journal of Internet Technology
    • Chang, T.Y.1    Yang, Y.J.2
  • 11
    • 33847652928 scopus 로고    scopus 로고
    • Advanced user authentication for mobile devices
    • DOI 10.1016/j.cose.2006.08.008, PII S0167404806001428
    • Clarke, N.L., Furnell, S.M., 2007a. Advanced user authentication for mobile devices. Computers & Security 26, 109-119. (Pubitemid 46367239)
    • (2007) Computers and Security , vol.26 , Issue.2 , pp. 109-119
    • Clarke, N.L.1    Furnell, S.M.2
  • 12
    • 33845701766 scopus 로고    scopus 로고
    • Authenticating mobile phone users using keystroke analysis
    • DOI 10.1007/s10207-006-0006-6
    • Clarke, N.L., Furnell, S.M., 2007b. Authenticating mobile phone users using keystroke analysis. International Journal of Information Security 6, 1-14. (Pubitemid 44963965)
    • (2007) International Journal of Information Security , vol.6 , Issue.1 , pp. 1-14
    • Clarke, N.L.1    Furnell, S.M.2
  • 14
    • 33646023117 scopus 로고    scopus 로고
    • An introduction to ROC analysis
    • Fawcett, T., 2006. An introduction to ROC analysis. Pattern Recognition Letters 27, 861-874.
    • (2006) Pattern Recognition Letters , vol.27 , pp. 861-874
    • Fawcett, T.1
  • 16
    • 80051791613 scopus 로고    scopus 로고
    • Unconstrained keystroke dynamics authentication with shared secret
    • Giot, R., El-Abed, M., Hemery, B., Rosenberger, C, 2011. Unconstrained keystroke dynamics authentication with shared secret. Computers & Security 30, 427-445.
    • (2011) Computers & Security , vol.30 , pp. 427-445
    • Giot, R.1    El-Abed, M.2    Hemery, B.3    Rosenberger, C.4
  • 18
    • 77957822108 scopus 로고    scopus 로고
    • Performance of keystroke biometrics authentication system using artificial neural network (ann) and distance classifier method
    • Harun, N., Woo, W.L., Dlay, S.S., 2010. Performance of keystroke biometrics authentication system using artificial neural network (ann) and distance classifier method. In: International Conference on Computer and Communication Engineering (ICCCE), pp. 1-6.
    • (2010) International Conference on Computer and Communication Engineering (ICCCE) , pp. 1-6
    • Harun, N.1    Woo, W.L.2    Dlay, S.S.3
  • 20
    • 57849163559 scopus 로고    scopus 로고
    • Keystroke dynamics-based authentication for mobile devices
    • Hwang, S., Cho, S., Park, S., 2009a. Keystroke dynamics-based authentication for mobile devices. Computers & Security 28, 85-93.
    • (2009) Computers & Security , vol.28 , pp. 85-93
    • Hwang, S.1    Cho, S.2    Park, S.3
  • 21
    • 67349185024 scopus 로고    scopus 로고
    • Improving authentication accuracy using artificial rhythms and cues for keystroke dynamics-based authentication
    • Hwang, S., Lee, H., Cho, S., 2009b. Improving authentication accuracy using artificial rhythms and cues for keystroke dynamics-based authentication. Expert Systems with Applications 36, 10649-10656.
    • (2009) Expert Systems with Applications , vol.36 , pp. 10649-10656
    • Hwang, S.1    Lee, H.2    Cho, S.3
  • 30
    • 62949238252 scopus 로고    scopus 로고
    • User authentication using combination of behavioral biometrics over the touchpad acting like touch screen of mobile device
    • Saevanee, H., Bhatarakosol, P., 2008. User authentication using combination of behavioral biometrics over the touchpad acting like touch screen of mobile device. In: Computer and Electrical Engineering, pp. 82-86.
    • (2008) Computer and Electrical Engineering , pp. 82-86
    • Saevanee, H.1    Bhatarakosol, P.2
  • 35
    • 19944381937 scopus 로고    scopus 로고
    • PassPoints: Design and longitudinal evaluation of a graphical password system
    • DOI 10.1016/j.ijhcs.2005.04.010, PII S1071581905000625, HCI Research in Privacy and Security
    • Wiedenbeck, S., Waters, J., Birget, J.C., Brodskiy, A., Memon, N., 2005b. Passpoints: design and longitudinalevaluationofagraphical password system. International Journal of Human-Computer Studies 63, 102-127. (Pubitemid 40753495)
    • (2005) International Journal of Human Computer Studies , vol.63 , Issue.1-2 , pp. 102-127
    • Wiedenbeck, S.1    Waters, J.2    Birget, J.-C.3    Brodskiy, A.4    Memon, N.5
  • 36
    • 80053547959 scopus 로고    scopus 로고
    • Correlation keystroke verification scheme for user access control in cloud computing environment
    • Xi, K., Tang, Y., Hu, J., 2011. Correlation keystroke verification scheme for user access control in cloud computing environment. The Computer Journal 54, 1632-1644.
    • (2011) The Computer Journal , vol.54 , pp. 1632-1644
    • Xi, K.1    Tang, Y.2    Hu, J.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.