E Maiorana, P Campisi, N González-Carballo… - Proceedings of the 2011 …, 2011 - dl.acm.org
In this paper we discuss the feasibility of employing keystroke dynamics to perform user verification on mobile phones. Specifically, after having introduced a new statistical …
M Antal, LZ Szabó, I László - Procedia Technology, 2015 - Elsevier
Currently people store more and more sensitive data on their mobile devices. Therefore it is highly important to strengthen the existing authentication mechanisms. The analysis of …
M Trojahn, F Ortmeier - 2013 27th international conference on …, 2013 - ieeexplore.ieee.org
Security and protection of personal data are becoming more and more important. At the same time, we see a steady rise of very powerful mobile devices like smartphones and …
M Rybnik, M Tabedzki, K Saeed - 2008 7th computer …, 2008 - ieeexplore.ieee.org
On-the-fly keyboard user authorization is certainly an interesting option for standard security procedures for high-security computer systems. Unauthorized access to logged-in …
M Antal, LZ Szabó - … on Control Systems and Computer Science, 2015 - ieeexplore.ieee.org
In this paper we study keystroke dynamics as an authentication mechanism for touch screen based devices. The authentication process decides whether the identity of a given person is …
Keystroke dynamics, also called keystroke biometrics or typing dynamics, is a biometric- based on typing style. Typists have unique typing patterns that can be analyzed to confirm …
M Choi, S Lee, M Jo, JS Shin - Sensors, 2021 - mdpi.com
Authentication methods using personal identification number (PIN) and unlock patterns are widely used in smartphone user authentication. However, these authentication methods are …
CJ Tasia, TY Chang, PC Cheng… - Security and …, 2014 - Wiley Online Library
After verifying the correctness of the password, the keystroke dynamics‐based authentication (KDA) system will verify the corresponding keystroke features. It provides …
A Alsultan, K Warwick - International Journal of Computer Science …, 2013 - researchgate.net
Current computer systems depend greatly on authentication methods in order to provide sufficient protection to the data handled by these systems. Rather than using the common …