PH Pisani, AC Lorena - Journal of the Brazilian Computer Society, 2013 - Springer
Computing and communication systems have improved our way of life, but have also contributed to an increased data exposure and, consequently, to identity theft. A possible …
In this paper we focus on a context independent continuous authentication system that reacts on every separate action performed by a user. We contribute with a robust dynamic …
R Giot, M El-Abed… - 2009 IEEE 3rd International …, 2009 - ieeexplore.ieee.org
Even if the market penetration rate of biometric technologies is still far below its potential, many biometric systems are used in our daily real-life. One of the main reasons to its low …
Keystroke biometrics (KB) authentication systems are a less popular form of access control, although they are gaining popularity. In recent years, keystroke biometric authentication has …
P Kang, S Cho - Information Sciences, 2015 - Elsevier
Keystroke dynamics, which refers to the typing pattern of an individual, has been highlighted as a practical behavioral biometric feature that does not require any additional recognition …
Keystroke dynamics has been used to strengthen password-based user authentication systems by considering the typing characteristics of legitimate users. The main problem with …
JV Monaco - 2018 IEEE Symposium on Security and Privacy …, 2018 - ieeexplore.ieee.org
The first keylogging side channel attack was discovered over 50 years ago when Bell Laboratory researchers noticed an electromagnetic spike emanating from a Bell 131-B2 …
Heterogeneous and aggregate vectors are the two widely used feature vectors in fixed text keystroke authentication. In this paper, we address the question “Which vectors …
Among all the existing biometric modalities, authentication systems based on keystroke dynamics present interesting advantages. These solutions are well accepted by users and …