[PDF][PDF] An approach for user authentication on non-keyboard devices using mouse click characteristics and statistical-based classification

CJ Tsai, TY Chang, YJ Yang, MS Wu, YC Li - International Journal of …, 2012 - ijicic.org
Internet security has become a serious issue for anyone connected to the Internet. To avoid
unauthorized people accessing an information system, keystroke dynamics-based …

Two novel biometric features in keystroke dynamics authentication systems for touch screen devices

CJ Tasia, TY Chang, PC Cheng… - Security and …, 2014 - Wiley Online Library
After verifying the correctness of the password, the keystroke dynamics‐based
authentication (KDA) system will verify the corresponding keystroke features. It provides …

Online User Authentication System Using Keystroke Dynamics

A Salem, A Sharieh, R Jabri - Journal of Computer Security, 2023 - content.iospress.com
Nowadays, people become more connected to the internet using their mobile devices. They
tend to use their critical and sensitive data among many applications. These applications …

A personalized rhythm click‐based authentication system

TY Chang, YJ Yang, CC Peng - Information Management & Computer …, 2010 - emerald.com
Purpose–In keystroke‐based authentication systems, an input device to enter a password is
needed. Users are verified by checking the validity of the password and typing …

A novel approach for user authentication using keystroke dynamics

K Shekhawat, DP Bhatt - Journal of Discrete Mathematical …, 2022 - Taylor & Francis
Abstract One Time Password (OTP) and Text Password are becoming less important in the
current age of cybercrime because of the rapid development of new security systems. A user …

Strengthening password authentication using keystroke dynamics and smartphone sensors

T Anusas-Amornkul - Proceedings of the 9th International Conference …, 2019 - dl.acm.org
Presently, a password authentication is a weak point for security in the authentication
scheme because a password is easy to be stolen and a user may ignore the security by …

[PDF][PDF] A Survey of behavioral authentication using keystroke dynamics: Touch screens and mobile devices

R Saifan, A Salem, D Zaidan… - Journal of Social Sciences …, 2016 - researchgate.net
Nowadays most systems became computerized and use internet for remote access,
including systems which have critical and sensitive data such as banks and governmental …

A comprehensive review of keystroke dynamics-based authentication mechanism

N Raul, R Shankarmani, P Joshi - … : Proceedings of ICICC 2019, Volume 2, 2020 - Springer
Keystroke dynamics, also called keystroke biometrics or typing dynamics, is a biometric-
based on typing style. Typists have unique typing patterns that can be analyzed to confirm …

Applying empirical thresholding algorithm for a keystroke dynamics based authentication system

PC Venugopal, KSA Viji - Journal of Information and …, 2019 - e-journal.uum.edu.my
Through the application of a password-based authentication technique, users are granted
permission to access a secure system when the username and password matches with that …

A study on feature of keystroke dynamics for improving accuracy in mobile environment

SH Lee, JH Roh, S Kim, SH Jin - … , WISA 2016, Jeju Island, Korea, August …, 2017 - Springer
User behavior-based authentication, while providing convenience to the user, is not widely
used in the real world due to its low accuracy. Keystroke dynamics is one of the user …