User authentication based on keystroke analysis of long free texts with a reduced number of features

S Park, J Park, S Cho - 2010 Second International Conference …, 2010 - ieeexplore.ieee.org
These days there are some papers about user classification and authentication based on
keystroke patterns from typing long and free text. We suggest more accurate and convenient …

Keystroke dynamics based user authentication using numeric keypad

BS Saini, N Kaur, KS Bhatia - 2017 7th International …, 2017 - ieeexplore.ieee.org
Keystroke dynamics is the study to identify/authenticate a person based on his/her typing
rhythms, which are inferred from keystroke events like key-press and key-release. A lot of …

Performance of keystroke biometrics authentication system using Multilayer Perceptron neural network (MLP NN)

N Harun, SS Dlay, WL Woo - 2010 7th International …, 2010 - ieeexplore.ieee.org
The use of computer has increased rapidly as well as the use of internet applications such
as e-commerce, online banking services, webmail, and blogs. All internet applications …

[PDF][PDF] Smartphone-based biometric authentication scheme for access control management in client-server environment

SA Lone, AH Mir - Int J Inf Technol Comput Sci, 2022 - academia.edu
As the information put together by the blend of smartphones, the cloud, the IOT, and
ubiquitous computing continue to expand at an alarming rate, a data breach increases …

[PDF][PDF] A multimodal behavioral biometric technique for user identification using mouse and keystroke dynamics

A Motwani, R Jain, J Sondhi - International Journal of Computer …, 2015 - researchgate.net
ABSTRACT A novel multimodal behavioral biometric technique is implemented to
authenticate/identify users by the way they interact with the input devices namely mouse and …

Keystroke dynamics‐based user authentication service for cloud computing

A Abo‐alian, NL Badr, MF Tolba - … and Computation: Practice …, 2016 - Wiley Online Library
User authentication is a crucial requirement for cloud service providers to prove that the
outsourced data and services are safe from imposters. Keystroke dynamics is a promising …

A survey of machine learning techniques for behavioral-based biometric user authentication

NA Mahadi, MA Mohamed, AI Mohamad… - Recent Advances in …, 2018 - books.google.com
Authentication is a way to enable an individual to be uniquely identified usually based on
passwords and personal identification number (PIN). The main problems of such …

User authentication on smartphones using keystroke dynamics

S Hriez, N Obeid, A Awajan - … of the Second International Conference on …, 2019 - dl.acm.org
These days, mobile devices have very sensitive and personal data that needs to be secured.
Mobile devices use authentication techniques to protect data from unauthorized access …

Authentication as a service for cloud computing

A Abo-Alian, NL Badr, MF Tolba - … Conference on Internet of things and …, 2016 - dl.acm.org
Traditional authentication techniques such as static passwords are vulnerable to replay and
guessing attacks. Recently, many studies have been conducted on keystroke dynamics as a …

Keyboard invariant biometric authentication

P Smriti, S Srivastava, S Singh - 2018 4th International …, 2018 - ieeexplore.ieee.org
Biometric authentication over internet is challenging due to the requirement of additional
hardware devices to capture the required biometric data. Keystroke dynamics based …