-
1
-
-
18444399366
-
Simple authenticated key agreement and protected password change protocol
-
T. Y. Chang, W. P. Yang and M. S. Hwang, Simple authenticated key agreement and protected password change protocol, Computers & Mathematics with Applications, vol.49, no.5-6, pp.703-714, 2005.
-
(2005)
Computers & Mathematics With Applications
, vol.49
, Issue.5-6
, pp. 703-714
-
-
Chang, T.Y.1
Yang, W.P.2
Hwang, M.S.3
-
3
-
-
37849023553
-
User classification for keystroke dynamics authentication
-
S. Hocquet, J. Y. Ramel and H. Cardot, User classification for keystroke dynamics authentication, Advances in Biometrics, LNCS, vol.4642, pp.531-539, 2007.
-
(2007)
Advances In Biometrics, LNCS
, vol.4642
, pp. 531-539
-
-
Hocquet, S.1
Ramel, J.Y.2
Cardot, H.3
-
4
-
-
13244284703
-
User authentication through typing biometrics features
-
L. C. F. Araujo, L. H. R. Sucupira Jr., M. G. Lizarraga, L. L. Ling and J. B. T. Yabu-Uti, User authentication through typing biometrics features, IEEE Transactions on Signal Processing, vol.53, no.2, pp.851-855, 2005.
-
(2005)
IEEE Transactions On Signal Processing
, vol.53
, Issue.2
, pp. 851-855
-
-
Araujo, L.C.F.1
Sucupira Jr., L.H.R.2
Lizarraga, M.G.3
Ling, L.L.4
Yabu-Uti, J.B.T.5
-
5
-
-
0025541584
-
Computer-access security systems using keystroke dynamics
-
S. Bleha, C. Slivinsky and B. Hussien, Computer-access security systems using keystroke dynamics, EEE Transactions on Pattern Analysis and Machine Intelligence, vol.12, no.12, pp.1217-1222, 1990.
-
(1990)
EEE Transactions On Pattern Analysis and Machine Intelligence
, vol.12
, Issue.12
, pp. 1217-1222
-
-
Bleha, S.1
Slivinsky, C.2
Hussien, B.3
-
6
-
-
56049086396
-
Gaussian mixture modeling of keystroke patterns for biometric applications
-
D. Hosseinzadeh and S. Krishnan, Gaussian mixture modeling of keystroke patterns for biometric applications, IEEE Transactions on Systems, Man, and Cybernetics - Part C: Applications and Reviews, vol.38, no.6, pp.816-826, 2008.
-
(2008)
IEEE Transactions On Systems, Man, and Cybernetics - Part C: Applications and Reviews
, vol.38
, Issue.6
, pp. 816-826
-
-
Hosseinzadeh, D.1
Krishnan, S.2
-
7
-
-
33744949030
-
Enhancing login security through the use of keystroke input dynamics
-
K. Revett, S. T. de Magalhaes and H. M. D. Santos, Enhancing login security through the use of keystroke input dynamics, Advances in Biometrics, LNCS, vol.3832, pp.661-667, 2005.
-
(2005)
Advances In Biometrics, LNCS
, vol.3832
, pp. 661-667
-
-
Revett, K.1
de Magalhaes, S.T.2
Santos, H.M.D.3
-
8
-
-
24644438726
-
A parallel decision tree based method for user authentication based on keystroke patterns
-
Y. Sheng, V. V. Phoha and S. M. Rovnyak, A parallel decision tree based method for user authentication based on keystroke patterns, IEEE Transactions on System, Man, and Cybernetics - Part B: Cybernetics, vol.35, no.4, pp.826-833, 2005.
-
(2005)
IEEE Transactions On System, Man, and Cybernetics - Part B: Cybernetics
, vol.35
, Issue.4
, pp. 826-833
-
-
Sheng, Y.1
Phoha, V.V.2
Rovnyak, S.M.3
-
9
-
-
57849147639
-
Statistical fusion approach on keystroke dynamics
-
P. S. Teh, A. B. J. Teoh, T. S. Ong and H. F. Neo, Statistical fusion approach on keystroke dynamics, Proc. of IEEE Conf. on Signal-Image Technologies and Internet-Based System, pp.918-923, 2008.
-
(2008)
Proc. of IEEE Conf. On Signal-Image Technologies and Internet-Based System
, pp. 918-923
-
-
Teh, P.S.1
Teoh, A.B.J.2
Ong, T.S.3
Neo, H.F.4
-
10
-
-
84869791034
-
User authentication using rhythm click characteristics for non-keyboard devices
-
T. Y. Chang, C. J. Tsai, Y. J. Yang and P. C. Cheng, User authentication using rhythm click characteristics for non-keyboard devices, Proc. of the International Conf. on Remote Sensing and Data, pp.167-17, 2011.
-
(2011)
Proc. of the International Conf. On Remote Sensing and Data
, pp. 117-167
-
-
Chang, T.Y.1
Tsai, C.J.2
Yang, Y.J.3
Cheng, P.C.4
-
11
-
-
84862870615
-
A graphical-based password keystroke dynamic authentication system for touch screen handheld mobile devices
-
T. Y. Chang, C. J. Tsai and J. H. Lin, A graphical-based password keystroke dynamic authentication system for touch screen handheld mobile devices, Journal of Systems and Software, 2012.
-
(2012)
Journal of Systems and Software
-
-
Chang, T.Y.1
Tsai, C.J.2
Lin, J.H.3
-
12
-
-
34249913467
-
Retraining a keystroke dynamics-based authenticator with impostor patterns
-
H. Lee and S. Cho, Retraining a keystroke dynamics-based authenticator with impostor patterns, Computers & Security, vol.26, no.4, pp.300-310, 2006.
-
(2006)
Computers & Security
, vol.26
, Issue.4
, pp. 300-310
-
-
Lee, H.1
Cho, S.2
-
13
-
-
0028423041
-
A multilayer neural network system for computer access security
-
M. S. Obaidat and S. Member, A multilayer neural network system for computer access security, IEEE Transactions on System, Man, and Cybernetics, vol.24, no.5, pp.806-813, 1994.
-
(1994)
IEEE Transactions On System, Man, and Cybernetics
, vol.24
, Issue.5
, pp. 806-813
-
-
Obaidat, M.S.1
Member, S.2
-
14
-
-
0031121887
-
Verification of computer users using keystroke dynamics
-
M. S. Obaidat and B. Sadoun, Verification of computer users using keystroke dynamics, IEEE Transactions on System, Man, and Cybernetics - Part B: Cybernetics, vol.27, no.2, pp.261-269, 1997.
-
(1997)
IEEE Transactions On System, Man, and Cybernetics - Part B: Cybernetics
, vol.27
, Issue.2
, pp. 261-269
-
-
Obaidat, M.S.1
Sadoun, B.2
-
15
-
-
77953251280
-
A personalized rhythm click-based authentication system
-
T. Y. Chang, Y. J. Yang and C. C. Peng, A personalized rhythm click-based authentication system, Information Management and Computer Security, vol.18, no.2, pp.72-85, 2010.
-
(2010)
Information Management and Computer Security
, vol.18
, Issue.2
, pp. 72-85
-
-
Chang, T.Y.1
Yang, Y.J.2
Peng, C.C.3
-
16
-
-
0031275601
-
Enhanced password authentication through fuzzy logic
-
W. G. de Ru and J. H. P. Eloff, Enhanced password authentication through fuzzy logic, IEEE Expert: Intelligent Systems and Their Applications, vol.12, no.6, pp.38-45, 1997.
-
(1997)
IEEE Expert: Intelligent Systems and Their Applications
, vol.12
, Issue.6
, pp. 38-45
-
-
de Ru, W.G.1
Eloff, J.H.P.2
-
17
-
-
0034497380
-
A multi-technique approach for user identification through keystroke dynamics
-
S. Haider, A. Abbas and A. K. Zaidi, A multi-technique approach for user identification through keystroke dynamics, Proc. of the the IEEE International Conf. on System, Man, and Cybernetics, pp.1336-1341, 2000.
-
(2000)
Proc. of the The IEEE International Conf. On System, Man, and Cybernetics
, pp. 1336-1341
-
-
Haider, S.1
Abbas, A.2
Zaidi, A.K.3
-
19
-
-
38049180651
-
Keystroke pressure-based typing biometrics authentication system using support vector machines
-
W. Martono, H. Ali and M. J. E. Salami, Keystroke pressure-based typing biometrics authentication system using support vector machines, Computational Science and Its Applications, LNCS, vol.4706, pp.85-93, 2007.
-
(2007)
Computational Science and Its Applications, LNCS
, vol.4706
, pp. 85-93
-
-
Martono, W.1
Ali, H.2
Salami, M.J.E.3
-
21
-
-
0034140431
-
Keystroke dynamics as a biometric for authentication
-
F. Monrose and A. D. Rubin, Keystroke dynamics as a biometric for authentication, Future Generation Computer Systems, vol.16, no.4, pp.351-359, 2000.
-
(2000)
Future Generation Computer Systems
, vol.16
, Issue.4
, pp. 351-359
-
-
Monrose, F.1
Rubin, A.D.2
-
22
-
-
78650165017
-
User authentication through keystroke dynamics
-
F. Bergadano, D. Gunetti and C. Picardi, User authentication through keystroke dynamics, ACM Transactions on Information and System Security, vol.5, no.4, pp.367-397, 2002.
-
(2002)
ACM Transactions On Information and System Security
, vol.5
, Issue.4
, pp. 367-397
-
-
Bergadano, F.1
Gunetti, D.2
Picardi, C.3
-
23
-
-
0032021402
-
Computer users verification using login string keystroke dynamics
-
J. A. Robinson, V. M. Liang, J. A. M. Chambers and C. L. MacKenzie, Computer users verification using login string keystroke dynamics, IEEE Transactions on System, Man, and Cybernetics - Part A: Systems and Humans, vol.28, no.2, pp.236-241, 1998.
-
(1998)
IEEE Transactions On System, Man, and Cybernetics - Part A: Systems and Humans
, vol.28
, Issue.2
, pp. 236-241
-
-
Robinson, J.A.1
Liang, V.M.2
Chambers, J.A.M.3
Mackenzie, C.L.4
-
24
-
-
38049049380
-
Keystroke dynamics for biometrics identification
-
M. Choras and P. Mroczkowski, Keystroke dynamics for biometrics identification, Adaptive and Natural Computing Algorithm, LNCS, vol.4432, pp.424-431, 2007.
-
(2007)
Adaptive and Natural Computing Algorithm, LNCS
, vol.4432
, pp. 424-431
-
-
Choras, M.1
Mroczkowski, P.2
-
25
-
-
33745198933
-
Keystroke analysis of different languages: A case study
-
D. Gunetti, C. Picardi and G. Ruffo, Keystroke analysis of different languages: A case study, Advances in Intelligent Data Analysis VI, LNCS, vol.3646, pp.133-144, 2005.
-
(2005)
Advances In Intelligent Data Analysis VI, LNCS
, vol.3646
, pp. 133-144
-
-
Gunetti, D.1
Picardi, C.2
Ruffo, G.3
-
27
-
-
38349018230
-
On the use of rough sets for user authentication via keystroke dynamics
-
K. Revett, S. T. de Magalhaes and H. M. D. Santos, On the use of rough sets for user authentication via keystroke dynamics, Progress in Artificial Intelligence, LNCS, vol.4874, pp.145-159, 2007.
-
(2007)
Progress In Artificial Intelligence, LNCS
, vol.4874
, pp. 145-159
-
-
Revett, K.1
de Magalhaes, S.T.2
Santos, H.M.D.3
-
28
-
-
0036213064
-
An ergonomic evaluation comparing desktop, notebook, and subnotebook computers
-
G. P. Szeto and R. Lee, An ergonomic evaluation comparing desktop, notebook, and subnotebook computers, Archives ofPhysical Medicine and Rehabilitation, vol.83, no.4, pp.527-532, 2002.
-
(2002)
Archives OfPhysical Medicine and Rehabilitation
, vol.83
, Issue.4
, pp. 527-532
-
-
Szeto, G.P.1
Lee, R.2
-
29
-
-
44849117259
-
Improvement of keystroke data quality through artificial rhythms and cues
-
P. Kang, S. Park, S. S. Hwang, H. J. Lee and S. Cho, Improvement of keystroke data quality through artificial rhythms and cues, Computer & Security, vol.27, no.1-2, pp.3-11, 2008.
-
(2008)
Computer & Security
, vol.27
, Issue.1-2
, pp. 3-11
-
-
Kang, P.1
Park, S.2
Hwang, S.S.3
Lee, H.J.4
Cho, S.5
-
30
-
-
21944437577
-
Proposal of user identification scheme using mouse
-
K. Hayashi, E. Okamoto and M. Mambo, Proposal of user identification scheme using mouse, Proc. of the 1st International Conf. on Information and Communication Security, LNCS, vol.1334, pp.144-148, 1997.
-
(1997)
Proc. of the 1st International Conf. On Information and Communication Security, LNCS
, vol.1334
, pp. 144-148
-
-
Hayashi, K.1
Okamoto, E.2
Mambo, M.3
-
31
-
-
84956859871
-
A user identification system using signature written with mouse
-
A. F. Syukri, E. Okamoto and M. Mambo, A user identification system using signature written with mouse, Information Security and Privacy, LNCS, vol.1438, pp.403-414, 1998.
-
(1998)
Information Security and Privacy, LNCS
, vol.1438
, pp. 403-414
-
-
Syukri, A.F.1
Okamoto, E.2
Mambo, M.3
-
32
-
-
34547965365
-
A new biometric technology based on mouse dynamics
-
A. A. E. Ahmed and I. Traore, A new biometric technology based on mouse dynamics, IEEE Transactions on Dependable and Secure Computing, vol.4, no.3, pp.165-179, 2007.
-
(2007)
IEEE Transactions On Dependable and Secure Computing
, vol.4
, Issue.3
, pp. 165-179
-
-
Ahmed, A.A.E.1
Traore, I.2
-
33
-
-
79952379784
-
A novel and simple statistical fusion method for user authentication through keystroke features
-
C. C. Peng, T. Y. Chang, C. J. Tsai, J. W. Li and C. S. Wu, A novel and simple statistical fusion method for user authentication through keystroke features, Journal of Convergence Information Technology, vol.6, no.2, pp.347-356, 2011.
-
(2011)
Journal of Convergence Information Technology
, vol.6
, Issue.2
, pp. 347-356
-
-
Peng, C.C.1
Chang, T.Y.2
Tsai, C.J.3
Li, J.W.4
Wu, C.S.5
-
34
-
-
33646023117
-
An introduction to ROC analysis
-
T. Fawcett, An introduction to ROC analysis, Pattern Recognition Letters, vol.27, no.8, pp.861-874, 2006.
-
(2006)
Pattern Recognition Letters
, vol.27
, Issue.8
, pp. 861-874
-
-
Fawcett, T.1
|