BioPrivacy: a behavioral biometrics continuous authentication system based on keystroke dynamics and touch gestures

I Stylios, A Skalkos, S Kokolakis… - Information & Computer …, 2022 - emerald.com
Purpose This research aims to build a system that will continuously. This paper is an
extended version of SECPRE 2021 paper and presents a research on the development and …

BioPrivacy: Development of a keystroke dynamics continuous authentication system

I Stylios, A Skalkos, S Kokolakis, M Karyda - European Symposium on …, 2021 - Springer
Session authentication schemes establish the identity of the user only at the beginning of the
session, so they are vulnerable to attacks that tamper with communications after the …

Continuous authentication with feature-level fusion of touch gestures and keystroke dynamics to solve security and usability issues

I Stylios, S Chatzis, O Thanou, S Kokolakis - Computers & Security, 2023 - Elsevier
Abstract Behavioral Biometrics (BB) Continuous Authentication (CA) systems monitor user
behavior and continuously re-authenticate user identity alongside the initial login process …

DAKOTA: Continuous authentication with behavioral biometrics in a mobile banking application

Y Barlas, OE Basar, Y Akan, M Isbilen… - … on computer science …, 2020 - ieeexplore.ieee.org
Behavioral biometrics focus on identifying patterns in human activities or behaviors.
Tracking and identifying interaction behavior of a user with a computing device is relatively a …

Continuous user authentication system: a risk analysis based approach

Neha, K Chatterjee - Wireless Personal Communications, 2019 - Springer
With the expansion of smart device users, the security mechanism of these devices in terms
of user authentication has been advanced a lot. These mechanisms consist of a pattern …

Continuous user authentication on smartphone via behavioral biometrics: a survey

PK Rayani, S Changder - Multimedia Tools and Applications, 2023 - Springer
The use of ubiquitous devices is increasing worldwide due to signs of progress in
sophisticated hardware technology with cutting-edge features. These features offer most …

User authentication based on dynamic keystroke recognition

KM Fouad, BM Hassan, MF Hassan - International Journal of …, 2016 - igi-global.com
Biometric identification is a very good candidate technology, which can facilitate a trusted
user authentication with minimum constraints on the security of the access point. However …

Continuous authentication using behavioral biometrics

I Deutschmann, P Nordström, L Nilsson - IT professional, 2013 - ieeexplore.ieee.org
A continuous behaviometric authentication system is tested on 99 users over 10 weeks,
focusing on keystroke dynamics, mouse movements, application usage, and the system …

A review of continuous authentication using behavioral biometrics

IC Stylios, O Thanou, I Androulidakis… - Proceedings of the …, 2016 - dl.acm.org
The present study carries out a literature review on the topic of Continuous Authentication
(CA) using behavioral biometrics. CA systems have been proposed in order to solve the …

Users' privacy attitudes towards the use of behavioral biometrics continuous authentication (BBCA) technologies: A protection motivation theory approach

A Skalkos, I Stylios, M Karyda, S Kokolakis - Journal of Cybersecurity and …, 2021 - mdpi.com
Smartphone user authentication based on passwords, PINs, and touch patterns raises
several security concerns. Behavioral Biometrics Continuous Authentication (BBCA) …