Improving authentication accuracy of unfamiliar passwords with pauses and cues for keystroke dynamics-based authentication

S Hwang, H Lee, S Cho - International Workshop on Intelligence and …, 2006 - Springer
Keystroke dynamics-based authentication (KDA) is to verify a user's identification using not
only the password but also keystroke patterns. The authors have shown in previous …

Improving authentication accuracy using artificial rhythms and cues for keystroke dynamics-based authentication

S Hwang, H Lee, S Cho - Expert Systems with Applications, 2009 - Elsevier
Keystroke dynamics-based authentication (KDA) is to verify a user's identity using not only
the password but also keystroke dynamics. With a small number of patterns available, data …

Improvement of keystroke data quality through artificial rhythms and cues

P Kang, S Park, S Hwang, H Lee, S Cho - computers & security, 2008 - Elsevier
Keystroke dynamics based user authentication (KDA) can achieve a relatively high
performance if a fairly large number of typing patterns are available. It is almost always the …

The effectiveness of artificial rhythms and cues in keystroke dynamics based user authentication

P Kang, S Park, S Cho, S Hwang, H Lee - International Workshop on …, 2006 - Springer
In keystroke dynamics based user authentication, an access system utilizes not only a valid
user's password, but also his/her typing patterns. Although high performances in terms of …

Online User Authentication System Using Keystroke Dynamics

A Salem, A Sharieh, R Jabri - Journal of Computer Security, 2023 - content.iospress.com
Nowadays, people become more connected to the internet using their mobile devices. They
tend to use their critical and sensitive data among many applications. These applications …

Keystroke dynamics recognition based on personal data: A comparative experimental evaluation implementing reproducible research

A Morales, M Falanga, J Fierrez… - 2015 IEEE 7th …, 2015 - ieeexplore.ieee.org
This work proposes a new benchmark for keystroke dynamics recognition on the basis of
fully reproducible research. Instead of traditional authentication approaches based on …

Normalizing variations in feature vector structure in keystroke dynamics authentication systems

Z Syed, S Banerjee, B Cukic - Software Quality Journal, 2016 - Springer
Usernames and passwords stubbornly remain the most prevalent authentication
mechanism. Password secrecy ensures that only genuine users are granted access. If the …

Two novel biometric features in keystroke dynamics authentication systems for touch screen devices

CJ Tasia, TY Chang, PC Cheng… - Security and …, 2014 - Wiley Online Library
After verifying the correctness of the password, the keystroke dynamics‐based
authentication (KDA) system will verify the corresponding keystroke features. It provides …

[PDF][PDF] Authenticating mobile phone user using keystroke dynamics

BS Saini, N Kaur, KS Bhatia - Int. J. Comput. Sci. Eng, 2018 - researchgate.net
Since few decades, the simple password authentication has either replaced or compounded
with biometrics (such as Facial Recognition, Fingerprint Scan etc.) to provide better security …

Leveraging variations in event sequences in keystroke-dynamics authentication systems

Z Syed, S Banerjee, B Cukic - 2014 IEEE 15th International …, 2014 - ieeexplore.ieee.org
User names and passwords stubbornly remain the most prevalent authentication
mechanism. Password secrecy ensures that only genuine users are granted access. If the …