Meta-heuristic optimization and keystroke dynamics for authentication of smartphone users

ESM El-Kenawy, S Mirjalili, AA Abdelhamid, A Ibrahim… - Mathematics, 2022 - mdpi.com
Personal Identification Numbers (PIN) and unlock patterns are two of the most often used
smartphone authentication mechanisms. Because PINs have just four or six characters, they …

Keystroke dynamics-based authentication for mobile devices

S Hwang, S Cho, S Park - Computers & Security, 2009 - Elsevier
Recently, mobile devices are used in financial applications such as banking and stock
trading. However, unlike desktops and notebook computers, a 4-digit personal identification …

I sensed it was you: authenticating mobile users with sensor-enhanced keystroke dynamics

C Giuffrida, K Majdanik, M Conti, H Bos - … 2014, Egham, UK, July 10-11 …, 2014 - Springer
Mobile devices have become an important part of our everyday life, harvesting more and
more confidential user information. Their portable nature and the great exposure to security …

Identification of user behavioral biometrics for authentication using keystroke dynamics and machine learning

S Krishnamoorthy, L Rueda, S Saad… - Proceedings of the 2018 …, 2018 - dl.acm.org
This paper focuses on the effective classification of the behavior of users accessing
computing devices to authenticate them. The authentication is based on keystroke dynamics …

Keystroke biometric systems for user authentication

ML Ali, JV Monaco, CC Tappert, M Qiu - Journal of Signal Processing …, 2017 - Springer
Keystroke biometrics (KB) authentication systems are a less popular form of access control,
although they are gaining popularity. In recent years, keystroke biometric authentication has …

Keystroke-based user identification on smart phones

S Zahid, M Shahzad, SA Khayam, M Farooq - International Workshop on …, 2009 - Springer
Smart phones are now being used to store users' identities and sensitive information/data.
Therefore, it is important to authenticate legitimate users of a smart phone and to block …

Deployment of keystroke analysis on a smartphone

A Buchoux, NL Clarke - 2008 - ro.ecu.edu.au
The current security on mobile devices is often limited to the Personal Identification Number
(PIN), a secretknowledge based technique that has historically demonstrated to provide …

A machine learning approach to keystroke dynamics based user authentication

K Revett, F Gorunescu, M Gorunescu… - International …, 2007 - inderscienceonline.com
The majority of computer systems employ a login ID and password as the principal method
for access security. In stand-alone situations, this level of security may be adequate, but …

User authentication through typing biometrics features

LCF Araújo, LHR Sucupira… - IEEE transactions on …, 2005 - ieeexplore.ieee.org
This paper uses a static keystroke dynamics in user authentication. The inputs are the key
down and up times and the key ASCII codes captured while the user is typing a string. Four …

Two novel biometric features in keystroke dynamics authentication systems for touch screen devices

CJ Tasia, TY Chang, PC Cheng… - Security and …, 2014 - Wiley Online Library
After verifying the correctness of the password, the keystroke dynamics‐based
authentication (KDA) system will verify the corresponding keystroke features. It provides …