De Magalhães et al., 2005 - Google Patents
An improved statistical keystroke dynamics algorithmDe Magalhães et al., 2005
View PDF- Document ID
- 14521995547465681593
- Author
- De Magalhães P
- dos Santos H
- Publication year
- Publication venue
- Proceedings of the IADIS MCCSIS
External Links
Snippet
User identification and authentication are major security concerns on all kind of computational systems. Especially when information is critical, security policies enforce the need for these security preventive measures. Passwords implement a simple mechanism …
- 238000000034 method 0 abstract description 16
Similar Documents
| Publication | Publication Date | Title |
|---|---|---|
| Hu et al. | A k-nearest neighbor approach for user authentication through biometric keystroke dynamics | |
| Ilonen | Keystroke dynamics | |
| Bhatt et al. | Keystroke dynamics for biometric authentication—A survey | |
| Obaidat et al. | Keystroke dynamics based authentication | |
| Ayotte et al. | Fast continuous user authentication using distance metric fusion of free-text keystroke data | |
| Giot et al. | Keystroke dynamics authentication for collaborative systems | |
| de Magalhães et al. | Password secured sites-stepping forward with keystroke dynamics | |
| Serwadda et al. | Using global knowledge of users' typing traits to attack keystroke biometrics templates | |
| Alshanketi et al. | Multimodal mobile keystroke dynamics biometrics combining fixed and variable passwords | |
| Revett et al. | Enhancing login security through the use of keystroke input dynamics | |
| Arsh et al. | Multiple approaches towards authentication using keystroke dynamics | |
| D'lima et al. | Password authentication using keystroke biometrics | |
| De Magalhães et al. | An improved statistical keystroke dynamics algorithm | |
| US20220245225A1 (en) | System and method to authenticate users on a computing system using a free text behavioral biometric method | |
| Rudrapal et al. | Improvisation of biometrics authentication and identification through keystrokes pattern analysis | |
| Saini et al. | Authenticating mobile phone user using keystroke dynamics | |
| Manandhar et al. | One-class classification to continuously authenticate users based on keystroke timing dynamics | |
| El Menshawy et al. | A keystroke dynamics based approach for continuous authentication | |
| Iyapparaja et al. | Enhancing user authentication through keystroke dynamics analysis using isolation forest algorithm | |
| van Oorschot | User authentication—passwords, biometrics and alternatives | |
| Rudrapal et al. | Internal attacker detection by analyzing user keystroke credential | |
| Magalhães et al. | Keystroke dynamics: stepping forward in authentication | |
| Barghouthi | Keystroke Dynamics. How typing characteristics differ from one application to another | |
| Van Hamme et al. | Masterkey attacks against free-text keystroke dynamics and security implications of demographic factors | |
| Panasiuk et al. | A modified algorithm for user identification by his typing on the keyboard |