-
4
-
-
13244284703
-
User authentication through typing biometrics features
-
Araujo, L., Sucupira Jr., L.H.R., Lizarraga, M., Ling, L., Yabu-Uti, J.B.T.: User authentication through typing biometrics features. IEEE Trans. Signal Process. 53(2), 851-855 (2005)
-
(2005)
IEEE Trans. Signal Process.
, vol.53
, Issue.2
, pp. 851-855
-
-
Araujo, L.1
Sucupira Jr., L.H.R.2
Lizarraga, M.3
Ling, L.4
Yabu-Uti, J.B.T.5
-
5
-
-
84961346783
-
Smudge attacks on smartphone touch screens
-
Aviv, A.J., Gibson, K., Mossop, E., Blaze, M., Smith, J.M.: Smudge attacks on smartphone touch screens. In: Proc. of the 4th USENIX Conf. on Offensive Technologies, pp. 1-7 (2010)
-
(2010)
Proc. of the 4th USENIX Conf. on Offensive Technologies
, pp. 1-7
-
-
Aviv, A.J.1
Gibson, K.2
Mossop, E.3
Blaze, M.4
Smith, J.M.5
-
6
-
-
84872119987
-
Practicality of accelerometer side channels on smartphones
-
Aviv, A.J., Sapp, B., Blaze, M., Smith, J.M.: Practicality of accelerometer side channels on smartphones. In: Proc. of the 28th Annual Computer Security Appl. Conf., pp. 41-50 (2012)
-
(2012)
Proc. of the 28th Annual Computer Security Appl. Conf.
, pp. 41-50
-
-
Aviv, A.J.1
Sapp, B.2
Blaze, M.3
Smith, J.M.4
-
7
-
-
78650165017
-
User authentication through keystroke dynamics
-
Bergadano, F., Gunetti, D., Picardi, C.: User authentication through keystroke dynamics. ACM Trans. Inf. Syst. Secur. 5(4), 367-397 (2002)
-
(2002)
ACM Trans. Inf. Syst. Secur.
, vol.5
, Issue.4
, pp. 367-397
-
-
Bergadano, F.1
Gunetti, D.2
Picardi, C.3
-
8
-
-
85022919385
-
Class-based n-gram models of natural language
-
Brown, P.F., de Souza, P.V., Mercer, R.L., Pietra, V.J.D., Lai, J.C.: Class-based n-gram models of natural language. Comput. Linguist. 18(4), 467-479 (1992)
-
(1992)
Comput. Linguist.
, vol.18
, Issue.4
, pp. 467-479
-
-
Brown, P.F.1
De Souza, P.V.2
Mercer, R.L.3
Pietra, V.J.D.4
Lai, J.C.5
-
11
-
-
84863091977
-
On the practicality of motion based keystroke inference attack
-
Katzenbeisser, S., Weippl, E., Camp, L.J., Volkamer, M., Reiter, M., Zhang, X. (eds.) Trust 2012. Springer, Heidelberg
-
Cai, L., Chen, H.: On the practicality of motion based keystroke inference attack. In: Katzenbeisser, S., Weippl, E., Camp, L.J., Volkamer, M., Reiter, M., Zhang, X. (eds.) Trust 2012. LNCS, vol. 7344, pp. 273-290. Springer, Heidelberg (2012)
-
(2012)
LNCS
, vol.7344
, pp. 273-290
-
-
Cai, L.1
Chen, H.2
-
12
-
-
67651146720
-
User authentication using keystroke dynamics for cellular phones
-
Campisi, P., Maiorana, E., Lo Bosco, M., Neri, A.: User authentication using keystroke dynamics for cellular phones. IET Signal Processing 3(4), 333-341 (2009)
-
(2009)
IET Signal Processing
, vol.3
, Issue.4
, pp. 333-341
-
-
Campisi, P.1
Maiorana, E.2
Lo Bosco, M.3
Neri, A.4
-
13
-
-
33845701766
-
Authenticating mobile phone users using keystroke analysis
-
Clarke, N.L., Furnell, S.M.: Authenticating mobile phone users using keystroke analysis. Int'l J. Inf. Secur. 6(1), 1-14 (2006)
-
(2006)
Int'l J. Inf. Secur.
, vol.6
, Issue.1
, pp. 1-14
-
-
Clarke, N.L.1
Furnell, S.M.2
-
14
-
-
3943091227
-
Keystroke dynamics on a mobile handset: A feasibility study
-
Clarke, N.L., Furnell, S.M., Lines, B.M., Reynolds, P.L.: Keystroke dynamics on a mobile handset: A feasibility study. Information Management & Computer Security 11(4), 161-166 (2003)
-
(2003)
Information Management & Computer Security
, vol.11
, Issue.4
, pp. 161-166
-
-
Clarke, N.L.1
Furnell, S.M.2
Lines, B.M.3
Reynolds, P.L.4
-
15
-
-
26844493026
-
Authentication of users on mobile telephones-A survey of attitudes and practices
-
Clarke, N.L., Furnell, S.M.: Authentication of users on mobile telephones-A survey of attitudes and practices. Computers & Security 24(7), 519-527 (2005)
-
(2005)
Computers & Security
, vol.24
, Issue.7
, pp. 519-527
-
-
Clarke, N.L.1
Furnell, S.M.2
-
16
-
-
79956003691
-
Mind how you answer me!: Transparently authenticating the user of a smartphone when answering or placing a call
-
Conti, M., Zachia-Zlatea, I., Crispo, B.: Mind how you answer me!: Transparently authenticating the user of a smartphone when answering or placing a call. In: Proc. of the Sixth ACM Symp. on Information, Computer and Communications Security, pp. 249-259 (2011)
-
(2011)
Proc. of the Sixth ACM Symp. on Information, Computer and Communications Security
, pp. 249-259
-
-
Conti, M.1
Zachia-Zlatea, I.2
Crispo, B.3
-
17
-
-
84876542471
-
From keyloggers to touchloggers: Take the rough with the smooth
-
Damopoulos, D., Kambourakis, G., Gritzalis, S.: From keyloggers to touchloggers: Take the rough with the smooth. Computers & Security 32, 102-114 (2013)
-
(2013)
Computers & Security
, vol.32
, pp. 102-114
-
-
Damopoulos, D.1
Kambourakis, G.2
Gritzalis, S.3
-
18
-
-
84862067265
-
Touch me once and i know it's you!: Implicit authentication based on touch screen patterns
-
De Luca, A., Hang, A., Brudy, F., Lindner, C., Hussmann, H.: Touch me once and i know it's you!: Implicit authentication based on touch screen patterns. In: Proc. of the SIGCHI Conf. on Human Factors in Computing Systems, pp. 987-996 (2012)
-
(2012)
Proc. of the SIGCHI Conf. on Human Factors in Computing Systems
, pp. 987-996
-
-
De Luca, A.1
Hang, A.2
Brudy, F.3
Lindner, C.4
Hussmann, H.5
-
19
-
-
84872116385
-
Touchalytics: On the applicability of touchscreen input as a behavioral biometric for continuous authentication
-
Frank, M., Biedert, R., Ma, E., Martinovic, I., Song, D.: Touchalytics: On the applicability of touchscreen input as a behavioral biometric for continuous authentication. IEEE Trans. Inf. Forensics and Security 8(1), 136-148 (2013)
-
(2013)
IEEE Trans. Inf. Forensics and Security
, vol.8
, Issue.1
, pp. 136-148
-
-
Frank, M.1
Biedert, R.2
Ma, E.3
Martinovic, I.4
Song, D.5
-
20
-
-
0343700185
-
-
Tech. rep.
-
Gaines, R.S., Lisowski, W., Press, S.J., Shapiro, N.: Authentication by keystroke timing. Tech. rep. (1980)
-
(1980)
Authentication by Keystroke Timing
-
-
Gaines, R.S.1
Lisowski, W.2
Press, S.J.3
Shapiro, N.4
-
21
-
-
78650503173
-
Acceleration axis selection in biometric technique based on gesture recognition
-
Guerra Casanova, J., Avila, C., de Santos Sierra, A., Bailador del Pozo, G., Jara Vera, V.: Acceleration axis selection in biometric technique based on gesture recognition. In: Proc. of the Sixth Int'l Conf. on Intelligent Information Hiding and Multimedia Signal Processing, pp. 360-363 (2010)
-
(2010)
Proc. of the Sixth Int'l Conf. on Intelligent Information Hiding and Multimedia Signal Processing
, pp. 360-363
-
-
Guerra Casanova, J.1
Avila, C.2
De Santos Sierra, A.3
Bailador Del Pozo, G.4
Jara Vera, V.5
-
22
-
-
84863297774
-
ACComplice: Location inference using accelerometers on smartphones
-
Han, J., Owusu, E., Nguyen, L., Perrig, A., Zhang, J.: ACComplice: Location inference using accelerometers on smartphones. In: Proc. of the Fourth Int'l Conf. on Communication Systems and Networks, pp. 1-9 (2012)
-
(2012)
Proc. of the Fourth Int'l Conf. on Communication Systems and Networks
, pp. 1-9
-
-
Han, J.1
Owusu, E.2
Nguyen, L.3
Perrig, A.4
Zhang, J.5
-
23
-
-
84868111494
-
Development of a typing behaviour recognition mechanism on android
-
Huang, X., Lund, G., Sapeluk, A.: Development of a typing behaviour recognition mechanism on android. In: Proc. of the 11th Int'l Conf. on Trust, Security and Privacy in Computing and Communications, pp. 1342-1347 (2012)
-
(2012)
Proc. of the 11th Int'l Conf. on Trust, Security and Privacy in Computing and Communications
, pp. 1342-1347
-
-
Huang, X.1
Lund, G.2
Sapeluk, A.3
-
24
-
-
57849163559
-
Keystroke dynamics-based authentication for mobile devices
-
Hwang, S.S., Cho, S., Park, S.: Keystroke dynamics-based authentication for mobile devices. Computers & Security 28(1-2), 85-93 (2009)
-
(2009)
Computers & Security
, vol.28
, Issue.1-2
, pp. 85-93
-
-
Hwang, S.S.1
Cho, S.2
Park, S.3
-
25
-
-
0025384135
-
Identity authentication based on keystroke latencies
-
Joyce, R., Gupta, G.: Identity authentication based on keystroke latencies. Communications of The ACM 33(2), 168-176 (1990)
-
(1990)
Communications of the ACM
, vol.33
, Issue.2
, pp. 168-176
-
-
Joyce, R.1
Gupta, G.2
-
26
-
-
37849027593
-
Continual retraining of keystroke dynamics based authenticator
-
Lee, S.-W., Li, S.Z. (eds.) ICB 2007. Springer, Heidelberg
-
Kang, P., Hwang, S.-s., Cho, S.: Continual retraining of keystroke dynamics based authenticator. In: Lee, S.-W., Li, S.Z. (eds.) ICB 2007. LNCS, vol. 4642, pp. 1203-1211. Springer, Heidelberg (2007)
-
(2007)
LNCS
, vol.4642
, pp. 1203-1211
-
-
Kang, P.1
Hwang, S.-s.2
Cho, S.3
-
27
-
-
36249004860
-
Keystroke analysis for thumb-based keyboards on mobile devices
-
Venter, H., Eloff, M., Labuschagne, L., Eloff, J., Solms, R. (eds.)
-
Karatzouni, S., Clarke, N.: Keystroke analysis for thumb-based keyboards on mobile devices. In: Venter, H., Eloff, M., Labuschagne, L., Eloff, J., Solms, R. (eds.) Proc. of the 22nd IFIP Int'l Information Security Conf., pp. 253-263 (2007)
-
(2007)
Proc. of the 22nd IFIP Int'l Information Security Conf.
, pp. 253-263
-
-
Karatzouni, S.1
Clarke, N.2
-
28
-
-
78249240878
-
Why did my detector do that?!: Predicting keystroke-dynamics error rates
-
Jha, S., Sommer, R., Kreibich, C. (eds.) RAID 2010. Springer, Heidelberg
-
Killourhy, K., Maxion, R.: Why did my detector do that?!: Predicting keystroke-dynamics error rates. In: Jha, S., Sommer, R., Kreibich, C. (eds.) RAID 2010. LNCS, vol. 6307, pp. 256-276. Springer, Heidelberg (2010)
-
(2010)
LNCS
, vol.6307
, pp. 256-276
-
-
Killourhy, K.1
Maxion, R.2
-
30
-
-
84870520698
-
A personal touch: Recognizing users based on touch screen behavior
-
Kolly, S.M., Wattenhofer, R., Welten, S.: A personal touch: Recognizing users based on touch screen behavior. In: Proc. of the Third Int'l Workshop on Sensing Applications on Mobile Phones, pp. 1-5 (2012)
-
(2012)
Proc. of the Third Int'l Workshop on Sensing Applications on Mobile Phones
, pp. 1-5
-
-
Kolly, S.M.1
Wattenhofer, R.2
Welten, S.3
-
31
-
-
27944479591
-
Evaluation on a keystroke authentication system by keying force incorporated with temporal characteristics of keystroke dynamics
-
Kotani, K., Horii, K.: Evaluation on a keystroke authentication system by keying force incorporated with temporal characteristics of keystroke dynamics. Behaviour & Information Technology 24(4), 289-302 (2005)
-
(2005)
Behaviour & Information Technology
, vol.24
, Issue.4
, pp. 289-302
-
-
Kotani, K.1
Horii, K.2
-
32
-
-
0023843707
-
Verifying identity via keystroke characteristics
-
Leggett, J., Williams, G.: Verifying identity via keystroke characteristics. Int'l J. Man-Mach. Stud. 28(1), 67-76 (1988)
-
(1988)
Int'l J. Man-Mach. Stud.
, vol.28
, Issue.1
, pp. 67-76
-
-
Leggett, J.1
Williams, G.2
-
34
-
-
0030721345
-
Computer-access authentication with neural network based keystroke identity verification
-
Lin, D.T.: Computer-access authentication with neural network based keystroke identity verification. In: Proc. of the Int'l Conf. on Neural Networks, pp. 174-178 (1997)
-
(1997)
Proc. of the Int'l Conf. on Neural Networks
, pp. 174-178
-
-
Lin, D.T.1
-
36
-
-
79959321460
-
Keystroke dynamics authentication for mobile phones
-
Maiorana, E., Campisi, P., González-Carballo, N., Neri, A.: Keystroke dynamics authentication for mobile phones. In: Proc. of the ACM Symp. on Applied Computing, pp. 21-26 (2011)
-
(2011)
Proc. of the ACM Symp. on Applied Computing
, pp. 21-26
-
-
Maiorana, E.1
Campisi, P.2
González-Carballo, N.3
Neri, A.4
-
37
-
-
33646811518
-
Identifying users of portable devices from gait pattern with accelerometers
-
Mantyjarvi, J., Lindholm, M., Vildjiounaite, E., Makela, S.M., Ailisto, H.: Identifying users of portable devices from gait pattern with accelerometers. In: Proc. of the Int'l Conf. on Acoustics, Speech, and Signal Processing, pp. 973-976 (2005)
-
(2005)
Proc. of the Int'l Conf. on Acoustics, Speech, and Signal Processing
, pp. 973-976
-
-
Mantyjarvi, J.1
Lindholm, M.2
Vildjiounaite, E.3
Makela, S.M.4
Ailisto, H.5
-
39
-
-
84879481969
-
Touch gestures based biometric authentication scheme for touchscreen mobile phones
-
Kutyłowski, M., Yung, M. (eds.) Inscrypt 2012. Springer, Heidelberg
-
Meng, Y., Wong, D.S., Schlegel, R., Kwok, L.-F.: Touch gestures based biometric authentication scheme for touchscreen mobile phones. In: Kutyłowski, M., Yung, M. (eds.) Inscrypt 2012. LNCS, vol. 7763, pp. 331-350. Springer, Heidelberg (2013)
-
(2013)
LNCS
, vol.7763
, pp. 331-350
-
-
Meng, Y.1
Wong, D.S.2
Schlegel, R.3
Kwok, L.-F.4
-
40
-
-
84864372370
-
Tapprints: Your finger taps have fingerprints
-
Miluzzo, E., Varshavsky, A., Balakrishnan, S., Choudhury, R.R.: Tapprints: Your finger taps have fingerprints. In: Proc. of the 10th Int'l Conf. on Mobile Systems, Applications, and Services, pp. 323-336 (2012)
-
(2012)
Proc. of the 10th Int'l Conf. on Mobile Systems, Applications, and Services
, pp. 323-336
-
-
Miluzzo, E.1
Varshavsky, A.2
Balakrishnan, S.3
Choudhury, R.R.4
-
42
-
-
0031121887
-
Verification of computer users using keystroke dynamics
-
Obaidat, M., Sadoun, B.: Verification of computer users using keystroke dynamics. IEEE Trans. Syst. Man, Cybern. B, Cybern. 27(2), 261-269 (1997)
-
(1997)
IEEE Trans. Syst. Man, Cybern. B, Cybern.
, vol.27
, Issue.2
, pp. 261-269
-
-
Obaidat, M.1
Sadoun, B.2
-
43
-
-
45249087957
-
A study on biometric authentication based on arm sweep action with acceleration sensor
-
Okumura, F., Kubota, A., Hatori, Y., Matsuo, K., Hashimoto, M., Koike, A.: A study on biometric authentication based on arm sweep action with acceleration sensor. In: Proc. of the Int'l Symp. on Intelligent Signal Processing and Communications, pp. 219-222 (2006)
-
(2006)
Proc. of the Int'l Symp. on Intelligent Signal Processing and Communications
, pp. 219-222
-
-
Okumura, F.1
Kubota, A.2
Hatori, Y.3
Matsuo, K.4
Hashimoto, M.5
Koike, A.6
-
44
-
-
84860294696
-
Accessory: Password inference using accelerometers on smartphones
-
Owusu, E., Han, J., Das, S., Perrig, A., Zhang, J.: Accessory: Password inference using accelerometers on smartphones. In: Proc. of the 12th Workshop on Mobile Computing Systems and Applications, pp. 1-6 (2012)
-
(2012)
Proc. of the 12th Workshop on Mobile Computing Systems and Applications
, pp. 1-6
-
-
Owusu, E.1
Han, J.2
Das, S.3
Perrig, A.4
Zhang, J.5
-
45
-
-
84874586100
-
Snoop-forge-replay attacks on continuous verification with keystrokes
-
Rahman, K., Balagani, K., Phoha, V.: Snoop-forge-replay attacks on continuous verification with keystrokes. IEEE Trans. on Information Forensics and Security 8(3), 528-541 (2013)
-
(2013)
IEEE Trans. on Information Forensics and Security
, vol.8
, Issue.3
, pp. 528-541
-
-
Rahman, K.1
Balagani, K.2
Phoha, V.3
-
46
-
-
0031275601
-
Enhanced password authentication through fuzzy logic
-
de Ru, W.G., Eloff, J.H.P.: Enhanced password authentication through fuzzy logic. IEEE Expert 12(6), 38-45 (1997)
-
(1997)
IEEE Expert
, vol.12
, Issue.6
, pp. 38-45
-
-
De Ru, W.G.1
Eloff, J.H.P.2
-
47
-
-
62949238252
-
User authentication using combination of behavioral biometrics over the touchpad acting like touch screen of mobile device
-
Saevanee, H., Bhatarakosol, P.: User authentication using combination of behavioral biometrics over the touchpad acting like touch screen of mobile device. In: Proc. of the Int'l Conf. on Computer and Electrical Engineering, pp. 82-86 (2008)
-
(2008)
Proc. of the Int'l Conf. on Computer and Electrical Engineering
, pp. 82-86
-
-
Saevanee, H.1
Bhatarakosol, P.2
-
49
-
-
84885006760
-
Examining a large keystroke biometrics dataset for statistical-attack openings
-
Serwadda, A., Phoha, V.V.: Examining a large keystroke biometrics dataset for statistical-attack openings. ACM Trans. Inf. Syst. Secur. 16(2), 1-30 (2013)
-
(2013)
ACM Trans. Inf. Syst. Secur.
, vol.16
, Issue.2
, pp. 1-30
-
-
Serwadda, A.1
Phoha, V.V.2
-
51
-
-
84887096486
-
Secure unlocking of mobile touch screen devices by simple gestures: You can see it but you can not do it
-
Shahzad, M., Liu, A.X., Samuel, A.: Secure unlocking of mobile touch screen devices by simple gestures: You can see it but you can not do it. In: Proc. of the 19th Annual Int'l Conf. on Mobile Computing and Networking, pp. 39-50 (2013)
-
(2013)
Proc. of the 19th Annual Int'l Conf. on Mobile Computing and Networking
, pp. 39-50
-
-
Shahzad, M.1
Liu, A.X.2
Samuel, A.3
-
53
-
-
84855983623
-
Robustness of keystroke-dynamics based biometrics against synthetic forgeries
-
Stefan, D., Shu, X., Yao, D.: Robustness of keystroke-dynamics based biometrics against synthetic forgeries. Computers & Security 31(1), 109-121 (2012)
-
(2012)
Computers & Security
, vol.31
, Issue.1
, pp. 109-121
-
-
Stefan, D.1
Shu, X.2
Yao, D.3
-
54
-
-
34250782167
-
A comparison of perceived and real shouldersurfing risks between alphanumeric and graphical passwords
-
Tari, F., Ozok, A.A., Holden, S.H.: A comparison of perceived and real shouldersurfing risks between alphanumeric and graphical passwords. In: Proc. of the Second Symp. on Usable Privacy and Security, pp. 56-66 (2006)
-
(2006)
Proc. of the Second Symp. on Usable Privacy and Security
, pp. 56-66
-
-
Tari, F.1
Ozok, A.A.2
Holden, S.H.3
-
55
-
-
84904113677
-
-
Security and Communication Networks
-
Tasi, C.J., Chang, T.Y., Cheng, P.C., Lin, J.H.: Two novel biometric features in keystroke dynamics authentication systems for touch screen devices. Security and Communication Networks (2013)
-
(2013)
Two Novel Biometric Features in Keystroke Dynamics Authentication Systems for Touch Screen Devices
-
-
Tasi, C.J.1
Chang, T.Y.2
Cheng, P.C.3
Lin, J.H.4
-
58
-
-
84888992253
-
Seeing double: Reconstructing obscured typed input from repeated compromising reflections
-
Xu, Y., Heinly, J., White, A.M., Monrose, F., Frahm, J.M.: Seeing double: Reconstructing obscured typed input from repeated compromising reflections. In: Proc. of the 2013 ACM Conf. on Computer and Communications Security, pp. 1063-1074 (2013)
-
(2013)
Proc. of the 2013 ACM Conf. on Computer and Communications Security
, pp. 1063-1074
-
-
Xu, Y.1
Heinly, J.2
White, A.M.3
Monrose, F.4
Frahm, J.M.5
-
59
-
-
84860679345
-
TapLogger: Inferring user inputs on smartphone touchscreens using on-board motion sensors
-
Xu, Z., Bai, K., Zhu, S.: TapLogger: Inferring user inputs on smartphone touchscreens using on-board motion sensors. In: Proc. of the Fifth ACM Conf. on Security and Privacy in Wireless and Mobile Networks, pp. 113-124 (2012)
-
(2012)
Proc. of the Fifth ACM Conf. on Security and Privacy in Wireless and Mobile Networks
, pp. 113-124
-
-
Xu, Z.1
Bai, K.2
Zhu, S.3
-
60
-
-
76649098286
-
Keystroke-based user identificationon smart phones
-
Kirda, E., Jha, S., Balzarotti, D. (eds.) RAID 2009. Springer, Heidelberg
-
Zahid, S., Shahzad, M., Khayam, S.A., Farooq, M.: Keystroke-based user identificationon smart phones. In: Kirda, E., Jha, S., Balzarotti, D. (eds.) RAID 2009. LNCS, vol. 5758, pp. 224-243. Springer, Heidelberg (2009)
-
(2009)
LNCS
, vol.5758
, pp. 224-243
-
-
Zahid, S.1
Shahzad, M.2
Khayam, S.A.3
Farooq, M.4
|