Non-conventional keystroke dynamics for user authentication

A Alsultan, K Warwick, H Wei - Pattern Recognition Letters, 2017 - Elsevier
This paper introduces an approach for user authentication using free-text keystroke
dynamics which incorporates the use of non-conventional keystroke features. Semi-timing …

[HTML][HTML] User authentication and identification using neural network

ML Ali, K Thakur, C Tappert - i-manager's Journal on …, 2015 - imanagerpublications.com
Now-a-days people are heavily dependent on computers to store and process important
information. User authentication and identification has become one of the most important …

Free‐text keystroke dynamics authentication for Arabic language

A Alsultan, K Warwick, H Wei - IET Biometrics, 2016 - Wiley Online Library
This study introduces an approach for user authentication using free‐text keystroke
dynamics which incorporates text in Arabic language. The Arabic language has completely …

Authentication personal

GC Boechat, JC Ferreira… - … on intelligent and …, 2007 - ieeexplore.ieee.org
This paper presents a boarding on biometric authentication through the Keystroke Dynamics
that it intends to identify a person from the habitual rhythm to type your complete name in a …

A novel security scheme for behavioral authentication systems based on keystroke dynamics

A Salem, MS Obaidat - Security and Privacy, 2019 - Wiley Online Library
This article presents a comprehensive analysis behavioral authentication systems based on
keystroke dynamics using android mobile devices. Behavioral security authentication is an …

Performance of keystroke biometrics authentication system using artificial neural network (ANN) and distance classifier method

N Harun, WL Woo, SS Dlay - International Conference on …, 2010 - ieeexplore.ieee.org
Having a secure information system depends on successful authentication of legitimate
users so as to prevent attacks from fraudulent persons. Traditional information security …

[PDF][PDF] Behavioral biometric based personal authentication in feature phones

A Thapliyal, OP Verma, A Kumar - International Journal of Electrical …, 2022 - academia.edu
The usage of mobile phones has increased multifold in the recent decades mostly because
of its utility in most of the aspects of daily life, such as communications, entertainment, and …

[PDF][PDF] Authentication of the user by keystroke dynamics for banking transaction system

N Chourasia - … of International Conference on Advances in …, 2014 - digitalxplore.org
In the past few decades the data usage from internet has been increased at very high rate.
The online payment and banking transactions also increased exponentially. But …

[PDF][PDF] Authentication method through keystrokes measurement of mobile users in cloud environment

M Babaeizadeh, M Bakhtiari, MA Maarof - Int. J. Advance Soft Compu …, 2014 - i-csrs.org
In order to deal with security of Mobile Cloud Computing (MCC) authentication plays an
important role. It is aimed to verify user's identity when they wish to request services via the …

Modular logic of authentication using dynamic keystroke pattern analysis

T Bhattasali, P Panasiuk, K Saeed, N Chaki… - AIP Conference …, 2016 - pubs.aip.org
Authenticating users in a continual manner has become extremely critical for a wide range of
applications in the domain of pervasive computing and Internet of Things (IoT). In these …