User authentication based on dynamic keystroke recognition

KM Fouad, BM Hassan, MF Hassan - International Journal of …, 2016 - igi-global.com
Biometric identification is a very good candidate technology, which can facilitate a trusted
user authentication with minimum constraints on the security of the access point. However …

A secured authentication system using an effective keystroke dynamics

G Jagadamba, SP Sharmila, T Gouda - Emerging Research in Electronics …, 2014 - Springer
In the field of computer security, most promising field is securing the data by allowing ease
access to authorized users. The biometric techniques like face recognition, voice recognition …

Online User Authentication System Using Keystroke Dynamics

A Salem, A Sharieh, R Jabri - Journal of Computer Security, 2023 - content.iospress.com
Nowadays, people become more connected to the internet using their mobile devices. They
tend to use their critical and sensitive data among many applications. These applications …

[PDF][PDF] On keystrokes as continuous user biometric authentication

SJ Quraishi, SS Bedi - International Journal of Engineering and …, 2019 - researchgate.net
Authentication of a user through an ID and password is generally done at the start of a
session. But the continuous authentication system observe the genuineness of the user …

Fixed-Text vs. Free-Text Keystroke Dynamics for User Authentication

SS Zeid, RA ElKamar, SI Hassan - Engineering Research Journal …, 2022 - journals.ekb.eg
There are many physical biometrics such as iris patterns and fingerprints. There are also
interactive gestures like how a person types on a keyboard, moves a mouse, holds a phone …

BioPrivacy: a behavioral biometrics continuous authentication system based on keystroke dynamics and touch gestures

I Stylios, A Skalkos, S Kokolakis… - Information & Computer …, 2022 - emerald.com
Purpose This research aims to build a system that will continuously. This paper is an
extended version of SECPRE 2021 paper and presents a research on the development and …

Identification of user behavioral biometrics for authentication using keystroke dynamics and machine learning

S Krishnamoorthy, L Rueda, S Saad… - Proceedings of the 2018 …, 2018 - dl.acm.org
This paper focuses on the effective classification of the behavior of users accessing
computing devices to authenticate them. The authentication is based on keystroke dynamics …

Behavioral biometrics scheme with keystroke and swipe dynamics for user authentication on mobile platform

KW Tse, K Hung - 2019 IEEE 9th Symposium on Computer …, 2019 - ieeexplore.ieee.org
Due to the explosive growth of mobile devices worldwide, authentication is receiving
increasing attention. Conventionally, explicit authentication methods such as password is …

Continuous user authentication system: a risk analysis based approach

Neha, K Chatterjee - Wireless Personal Communications, 2019 - Springer
With the expansion of smart device users, the security mechanism of these devices in terms
of user authentication has been advanced a lot. These mechanisms consist of a pattern …

Non-conventional keystroke dynamics for user authentication

A Alsultan, K Warwick, H Wei - Pattern Recognition Letters, 2017 - Elsevier
This paper introduces an approach for user authentication using free-text keystroke
dynamics which incorporates the use of non-conventional keystroke features. Semi-timing …