메뉴 건너뛰기




Volumn 211, Issue , 2012, Pages 36-47

Dynamically generate a long-lived private key based on password keystroke features and neural network

Author keywords

Biometric; Cryptography; Key store; Keystroke feature; Neural network; Password guessing attack

Indexed keywords

BIT-STRINGS; CRYPTOGRAPHIC HARDWARE; CRYPTOGRAPHIC SCHEMES; KEY STORE; KEYSTROKE FEATURE; NEURAL NETWORK TECHNIQUES; NON-REPUDIATION; PASSWORD GUESSING ATTACK; PRIVATE KEY; STORAGE UNITS;

EID: 84862871527     PISSN: 00200255     EISSN: None     Source Type: Journal    
DOI: 10.1016/j.ins.2012.04.009     Document Type: Article
Times cited : (20)

References (28)
  • 2
    • 45849114774 scopus 로고    scopus 로고
    • A convertible multi-authenticated encryption scheme for group communications
    • T.Y. Chang A convertible multi-authenticated encryption scheme for group communications Information Sciences 178 17 2008 3426 3434
    • (2008) Information Sciences , vol.178 , Issue.17 , pp. 3426-3434
    • Chang, T.Y.1
  • 3
    • 77958095782 scopus 로고    scopus 로고
    • A communication-efficient three-party password authenticated key exchange protocol
    • T.Y. Chang, M.S. Hwang, and W.P. Yang A communication-efficient three-party password authenticated key exchange protocol Information Sciences 181 2 2011 217 226
    • (2011) Information Sciences , vol.181 , Issue.2 , pp. 217-226
    • Chang, T.Y.1    Hwang, M.S.2    Yang, W.P.3
  • 4
    • 84862870615 scopus 로고    scopus 로고
    • A graphical-based password keystroke dynamic authentication system for touch screen handheld mobile devices
    • T.Y. Chang, C.J. Tsai, J.H. Lin, and A graphical-based password keystroke dynamic authentication system for touch screen handheld mobile devices Journal of Systems and Software 85 5 2012 1157 1165
    • (2012) Journal of Systems and Software , vol.85 , Issue.5 , pp. 1157-1165
    • Chang, T.Y.1    Tsai, C.J.2    Lin, J.H.3
  • 5
    • 84862861708 scopus 로고    scopus 로고
    • A simple keystroke dynamics-based authentication system using means and standard deviations
    • C.L. Liu, T.Y. Chang, M.L. Chiang, and C.J. Tsai A simple keystroke dynamics-based authentication system using means and standard deviations Journal of Internet Technology 13 3 2012 439 444
    • (2012) Journal of Internet Technology , vol.13 , Issue.3 , pp. 439-444
    • Liu, C.L.1    Chang, T.Y.2    Chiang, M.L.3    Tsai, C.J.4
  • 10
    • 84862848138 scopus 로고    scopus 로고
    • NXP RFID encryption cracked
    • Christoph Hammerschmidt
    • Christoph Hammerschmidt, NXP RFID encryption cracked, EE Times, 2008. < http://www.eetimes.com >.
    • (2008) EE Times
  • 11
    • 84855431560 scopus 로고    scopus 로고
    • Efficient certificateless proxy signature scheme with provable security
    • J. Herranz Efficient certificateless proxy signature scheme with provable security Information Sciences 188 1 2012 322 337
    • (2012) Information Sciences , vol.188 , Issue.1 , pp. 322-337
    • Herranz, J.1
  • 14
    • 57849163559 scopus 로고    scopus 로고
    • Keystroke dynamics-based authentication for mobile devices
    • S. Hwang, S. Cho, and S. Park Keystroke dynamics-based authentication for mobile devices Computers & Security 28 1-2 2009 85 93
    • (2009) Computers & Security , vol.28 , Issue.12 , pp. 85-93
    • Hwang, S.1    Cho, S.2    Park, S.3
  • 15
    • 44849117259 scopus 로고    scopus 로고
    • Improvement of keystroke data quality through artificial rhythms and cues
    • P. Kang, S. Park, S. Hwang, H. Lee, and S. Cho Improvement of keystroke data quality through artificial rhythms and cues Computers & Security 27 1-2 2008 3 11
    • (2008) Computers & Security , vol.27 , Issue.12 , pp. 3-11
    • Kang, P.1    Park, S.2    Hwang, S.3    Lee, H.4    Cho, S.5
  • 17
    • 0001117376 scopus 로고    scopus 로고
    • Spatiotemporal connectionist networks: A taxonomy and review
    • DOI 10.1162/089976601300014538
    • S.C. Kremer Spatiotemporal connectionist networks: a taxonomy and review Neural Computation 13 2001 249 306 (Pubitemid 33594999)
    • (2001) Neural Computation , vol.13 , Issue.2 , pp. 249-306
    • Kremer, S.C.1
  • 18
    • 79953274686 scopus 로고    scopus 로고
    • Self-generated-certificate public key encryption without pairing and its application
    • J. Lai, W. Kou, and K. Chen Self-generated-certificate public key encryption without pairing and its application Information Sciences 181 11 2011 2422 2435
    • (2011) Information Sciences , vol.181 , Issue.11 , pp. 2422-2435
    • Lai, J.1    Kou, W.2    Chen, K.3
  • 19
    • 34249913467 scopus 로고    scopus 로고
    • Retraining a keystroke dynamics-based authenticator with impostor patterns
    • H.J. Lee, and S. Cho Retraining a keystroke dynamics-based authenticator with impostor patterns Computers & Security 26 2006 300 310
    • (2006) Computers & Security , vol.26 , pp. 300-310
    • Lee, H.J.1    Cho, S.2
  • 20
    • 76349117227 scopus 로고    scopus 로고
    • Simple password-based three-party authenticated key exchange without server public keys
    • T.F. Lee, and T. Hwang Simple password-based three-party authenticated key exchange without server public keys Information Sciences 180 9 2010 1702 1714
    • (2010) Information Sciences , vol.180 , Issue.9 , pp. 1702-1714
    • Lee, T.F.1    Hwang, T.2
  • 22
    • 1242295745 scopus 로고    scopus 로고
    • Security requirements for cryptographic modules
    • National Institute of Standards and Technology, FIPS PUB 140-2 US Department of Commerce May
    • National Institute of Standards and Technology, FIPS PUB 140-2, security requirements for cryptographic modules, in: National Institute of Standards and Technology, US Department of Commerce, May 2004.
    • (2004) National Institute of Standards and Technology
  • 24
    • 84862858138 scopus 로고    scopus 로고
    • PC Toolsdasfasdf Security guide for windows - random password generator
    • PC Toolsdasfasdf Security guide for windows - random password generator, 2010. < http://www.pctools.com/guides/password >.
    • (2010)
  • 28
    • 80055041764 scopus 로고    scopus 로고
    • Provably secure three-party password-based authenticated key exchange protocol
    • J. Zhao, and D. Gu Provably secure three-party password-based authenticated key exchange protocol Information Sciences 184 1 2012 310 323
    • (2012) Information Sciences , vol.184 , Issue.1 , pp. 310-323
    • Zhao, J.1    Gu, D.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.