A three-step authentication model for mobile phone user using keystroke dynamics

BS Saini, P Singh, A Nayyar, N Kaur, KS Bhatia… - IEEE …, 2020 - ieeexplore.ieee.org
The use of keystroke dynamics for user authentication has evolved over the years and has
found its application in mobile phones. But the primary challenge with mobile phones is that …

Touch keystroke dynamics for demographic classification

L Cascone, M Nappi, F Narducci, C Pero - Pattern Recognition Letters, 2022 - Elsevier
Soft biometric traits are not fully distinctive in recognition tasks, but they can effectively
added to biometric recognition systems to improve the overall performance. In this work, the …

[PDF][PDF] A Three-Step Authentication Model For Mobile Phone User Using Keystroke Dynamics

JWAN HU - scholar.archive.org
The use of keystroke dynamics for user authentication has evolved over the years and has
found its application in mobile phones. But the primary challenge with mobile phones is that …