메뉴 건너뛰기




Volumn 8550 LNCS, Issue , 2014, Pages 92-111

I sensed it was you: Authenticating mobile users with sensor-enhanced keystroke dynamics

Author keywords

[No Author keywords available]

Indexed keywords

ARTIFICIAL INTELLIGENCE; BEHAVIORAL RESEARCH; BIOMETRICS; COMPUTER CRIME; DYNAMICS; FEATURE EXTRACTION; LEARNING SYSTEMS; MALWARE; MOBILE DEVICES; MOBILE TELECOMMUNICATION SYSTEMS; SENSORS;

EID: 84904126030     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/978-3-319-08509-8_6     Document Type: Conference Paper
Times cited : (104)

References (60)
  • 11
    • 84863091977 scopus 로고    scopus 로고
    • On the practicality of motion based keystroke inference attack
    • Katzenbeisser, S., Weippl, E., Camp, L.J., Volkamer, M., Reiter, M., Zhang, X. (eds.) Trust 2012. Springer, Heidelberg
    • Cai, L., Chen, H.: On the practicality of motion based keystroke inference attack. In: Katzenbeisser, S., Weippl, E., Camp, L.J., Volkamer, M., Reiter, M., Zhang, X. (eds.) Trust 2012. LNCS, vol. 7344, pp. 273-290. Springer, Heidelberg (2012)
    • (2012) LNCS , vol.7344 , pp. 273-290
    • Cai, L.1    Chen, H.2
  • 12
    • 67651146720 scopus 로고    scopus 로고
    • User authentication using keystroke dynamics for cellular phones
    • Campisi, P., Maiorana, E., Lo Bosco, M., Neri, A.: User authentication using keystroke dynamics for cellular phones. IET Signal Processing 3(4), 333-341 (2009)
    • (2009) IET Signal Processing , vol.3 , Issue.4 , pp. 333-341
    • Campisi, P.1    Maiorana, E.2    Lo Bosco, M.3    Neri, A.4
  • 13
    • 33845701766 scopus 로고    scopus 로고
    • Authenticating mobile phone users using keystroke analysis
    • Clarke, N.L., Furnell, S.M.: Authenticating mobile phone users using keystroke analysis. Int'l J. Inf. Secur. 6(1), 1-14 (2006)
    • (2006) Int'l J. Inf. Secur. , vol.6 , Issue.1 , pp. 1-14
    • Clarke, N.L.1    Furnell, S.M.2
  • 15
    • 26844493026 scopus 로고    scopus 로고
    • Authentication of users on mobile telephones-A survey of attitudes and practices
    • Clarke, N.L., Furnell, S.M.: Authentication of users on mobile telephones-A survey of attitudes and practices. Computers & Security 24(7), 519-527 (2005)
    • (2005) Computers & Security , vol.24 , Issue.7 , pp. 519-527
    • Clarke, N.L.1    Furnell, S.M.2
  • 17
    • 84876542471 scopus 로고    scopus 로고
    • From keyloggers to touchloggers: Take the rough with the smooth
    • Damopoulos, D., Kambourakis, G., Gritzalis, S.: From keyloggers to touchloggers: Take the rough with the smooth. Computers & Security 32, 102-114 (2013)
    • (2013) Computers & Security , vol.32 , pp. 102-114
    • Damopoulos, D.1    Kambourakis, G.2    Gritzalis, S.3
  • 19
    • 84872116385 scopus 로고    scopus 로고
    • Touchalytics: On the applicability of touchscreen input as a behavioral biometric for continuous authentication
    • Frank, M., Biedert, R., Ma, E., Martinovic, I., Song, D.: Touchalytics: On the applicability of touchscreen input as a behavioral biometric for continuous authentication. IEEE Trans. Inf. Forensics and Security 8(1), 136-148 (2013)
    • (2013) IEEE Trans. Inf. Forensics and Security , vol.8 , Issue.1 , pp. 136-148
    • Frank, M.1    Biedert, R.2    Ma, E.3    Martinovic, I.4    Song, D.5
  • 24
    • 57849163559 scopus 로고    scopus 로고
    • Keystroke dynamics-based authentication for mobile devices
    • Hwang, S.S., Cho, S., Park, S.: Keystroke dynamics-based authentication for mobile devices. Computers & Security 28(1-2), 85-93 (2009)
    • (2009) Computers & Security , vol.28 , Issue.1-2 , pp. 85-93
    • Hwang, S.S.1    Cho, S.2    Park, S.3
  • 25
    • 0025384135 scopus 로고
    • Identity authentication based on keystroke latencies
    • Joyce, R., Gupta, G.: Identity authentication based on keystroke latencies. Communications of The ACM 33(2), 168-176 (1990)
    • (1990) Communications of the ACM , vol.33 , Issue.2 , pp. 168-176
    • Joyce, R.1    Gupta, G.2
  • 26
    • 37849027593 scopus 로고    scopus 로고
    • Continual retraining of keystroke dynamics based authenticator
    • Lee, S.-W., Li, S.Z. (eds.) ICB 2007. Springer, Heidelberg
    • Kang, P., Hwang, S.-s., Cho, S.: Continual retraining of keystroke dynamics based authenticator. In: Lee, S.-W., Li, S.Z. (eds.) ICB 2007. LNCS, vol. 4642, pp. 1203-1211. Springer, Heidelberg (2007)
    • (2007) LNCS , vol.4642 , pp. 1203-1211
    • Kang, P.1    Hwang, S.-s.2    Cho, S.3
  • 27
    • 36249004860 scopus 로고    scopus 로고
    • Keystroke analysis for thumb-based keyboards on mobile devices
    • Venter, H., Eloff, M., Labuschagne, L., Eloff, J., Solms, R. (eds.)
    • Karatzouni, S., Clarke, N.: Keystroke analysis for thumb-based keyboards on mobile devices. In: Venter, H., Eloff, M., Labuschagne, L., Eloff, J., Solms, R. (eds.) Proc. of the 22nd IFIP Int'l Information Security Conf., pp. 253-263 (2007)
    • (2007) Proc. of the 22nd IFIP Int'l Information Security Conf. , pp. 253-263
    • Karatzouni, S.1    Clarke, N.2
  • 28
    • 78249240878 scopus 로고    scopus 로고
    • Why did my detector do that?!: Predicting keystroke-dynamics error rates
    • Jha, S., Sommer, R., Kreibich, C. (eds.) RAID 2010. Springer, Heidelberg
    • Killourhy, K., Maxion, R.: Why did my detector do that?!: Predicting keystroke-dynamics error rates. In: Jha, S., Sommer, R., Kreibich, C. (eds.) RAID 2010. LNCS, vol. 6307, pp. 256-276. Springer, Heidelberg (2010)
    • (2010) LNCS , vol.6307 , pp. 256-276
    • Killourhy, K.1    Maxion, R.2
  • 31
    • 27944479591 scopus 로고    scopus 로고
    • Evaluation on a keystroke authentication system by keying force incorporated with temporal characteristics of keystroke dynamics
    • Kotani, K., Horii, K.: Evaluation on a keystroke authentication system by keying force incorporated with temporal characteristics of keystroke dynamics. Behaviour & Information Technology 24(4), 289-302 (2005)
    • (2005) Behaviour & Information Technology , vol.24 , Issue.4 , pp. 289-302
    • Kotani, K.1    Horii, K.2
  • 32
    • 0023843707 scopus 로고
    • Verifying identity via keystroke characteristics
    • Leggett, J., Williams, G.: Verifying identity via keystroke characteristics. Int'l J. Man-Mach. Stud. 28(1), 67-76 (1988)
    • (1988) Int'l J. Man-Mach. Stud. , vol.28 , Issue.1 , pp. 67-76
    • Leggett, J.1    Williams, G.2
  • 34
    • 0030721345 scopus 로고    scopus 로고
    • Computer-access authentication with neural network based keystroke identity verification
    • Lin, D.T.: Computer-access authentication with neural network based keystroke identity verification. In: Proc. of the Int'l Conf. on Neural Networks, pp. 174-178 (1997)
    • (1997) Proc. of the Int'l Conf. on Neural Networks , pp. 174-178
    • Lin, D.T.1
  • 39
    • 84879481969 scopus 로고    scopus 로고
    • Touch gestures based biometric authentication scheme for touchscreen mobile phones
    • Kutyłowski, M., Yung, M. (eds.) Inscrypt 2012. Springer, Heidelberg
    • Meng, Y., Wong, D.S., Schlegel, R., Kwok, L.-F.: Touch gestures based biometric authentication scheme for touchscreen mobile phones. In: Kutyłowski, M., Yung, M. (eds.) Inscrypt 2012. LNCS, vol. 7763, pp. 331-350. Springer, Heidelberg (2013)
    • (2013) LNCS , vol.7763 , pp. 331-350
    • Meng, Y.1    Wong, D.S.2    Schlegel, R.3    Kwok, L.-F.4
  • 42
    • 0031121887 scopus 로고    scopus 로고
    • Verification of computer users using keystroke dynamics
    • Obaidat, M., Sadoun, B.: Verification of computer users using keystroke dynamics. IEEE Trans. Syst. Man, Cybern. B, Cybern. 27(2), 261-269 (1997)
    • (1997) IEEE Trans. Syst. Man, Cybern. B, Cybern. , vol.27 , Issue.2 , pp. 261-269
    • Obaidat, M.1    Sadoun, B.2
  • 46
    • 0031275601 scopus 로고    scopus 로고
    • Enhanced password authentication through fuzzy logic
    • de Ru, W.G., Eloff, J.H.P.: Enhanced password authentication through fuzzy logic. IEEE Expert 12(6), 38-45 (1997)
    • (1997) IEEE Expert , vol.12 , Issue.6 , pp. 38-45
    • De Ru, W.G.1    Eloff, J.H.P.2
  • 47
    • 62949238252 scopus 로고    scopus 로고
    • User authentication using combination of behavioral biometrics over the touchpad acting like touch screen of mobile device
    • Saevanee, H., Bhatarakosol, P.: User authentication using combination of behavioral biometrics over the touchpad acting like touch screen of mobile device. In: Proc. of the Int'l Conf. on Computer and Electrical Engineering, pp. 82-86 (2008)
    • (2008) Proc. of the Int'l Conf. on Computer and Electrical Engineering , pp. 82-86
    • Saevanee, H.1    Bhatarakosol, P.2
  • 49
    • 84885006760 scopus 로고    scopus 로고
    • Examining a large keystroke biometrics dataset for statistical-attack openings
    • Serwadda, A., Phoha, V.V.: Examining a large keystroke biometrics dataset for statistical-attack openings. ACM Trans. Inf. Syst. Secur. 16(2), 1-30 (2013)
    • (2013) ACM Trans. Inf. Syst. Secur. , vol.16 , Issue.2 , pp. 1-30
    • Serwadda, A.1    Phoha, V.V.2
  • 52
  • 53
    • 84855983623 scopus 로고    scopus 로고
    • Robustness of keystroke-dynamics based biometrics against synthetic forgeries
    • Stefan, D., Shu, X., Yao, D.: Robustness of keystroke-dynamics based biometrics against synthetic forgeries. Computers & Security 31(1), 109-121 (2012)
    • (2012) Computers & Security , vol.31 , Issue.1 , pp. 109-121
    • Stefan, D.1    Shu, X.2    Yao, D.3
  • 54
    • 34250782167 scopus 로고    scopus 로고
    • A comparison of perceived and real shouldersurfing risks between alphanumeric and graphical passwords
    • Tari, F., Ozok, A.A., Holden, S.H.: A comparison of perceived and real shouldersurfing risks between alphanumeric and graphical passwords. In: Proc. of the Second Symp. on Usable Privacy and Security, pp. 56-66 (2006)
    • (2006) Proc. of the Second Symp. on Usable Privacy and Security , pp. 56-66
    • Tari, F.1    Ozok, A.A.2    Holden, S.H.3
  • 60
    • 76649098286 scopus 로고    scopus 로고
    • Keystroke-based user identificationon smart phones
    • Kirda, E., Jha, S., Balzarotti, D. (eds.) RAID 2009. Springer, Heidelberg
    • Zahid, S., Shahzad, M., Khayam, S.A., Farooq, M.: Keystroke-based user identificationon smart phones. In: Kirda, E., Jha, S., Balzarotti, D. (eds.) RAID 2009. LNCS, vol. 5758, pp. 224-243. Springer, Heidelberg (2009)
    • (2009) LNCS , vol.5758 , pp. 224-243
    • Zahid, S.1    Shahzad, M.2    Khayam, S.A.3    Farooq, M.4


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.