Identity authentication based on keystroke latencies
Communications of the ACM
Extending Fitts' law to two-dimensional tasks
CHI '92 Proceedings of the SIGCHI Conference on Human Factors in Computing Systems
Keystroke dynamics as a biometric for authentication
Future Generation Computer Systems - Special issue on security on the Web
Data Mining and Knowledge Discovery
Pattern Classification (2nd Edition)
Pattern Classification (2nd Edition)
Biometrics and Network Security
Biometrics and Network Security
ICPR '04 Proceedings of the Pattern Recognition, 17th International Conference on (ICPR'04) Volume 2 - Volume 02
Learning User Profile from Traces
SAINT-W '05 Proceedings of the 2005 Symposium on Applications and the Internet Workshops
Principles of Information Security
Principles of Information Security
Behavioural biometrics: a survey and classification
International Journal of Biometrics
Verification of computer users using keystroke dynamics
IEEE Transactions on Systems, Man, and Cybernetics, Part B: Cybernetics
Cost and benefit analysis of authentication systems
Decision Support Systems
Modeling the Impact of Biometric Security on Millennials' Protection Motivation
Journal of Organizational and End User Computing
Hi-index | 0.00 |
While online applications can provide convenience to individuals and organizations, they can pose significant remote user authentication challenges. One possible solution to these challenges is to utilize behavioral typing patterns to provide an additional layer of authentication. Such behavioral biometrics have the advantage of being revocable if compromised, unlike physical biometrics such as fingerprints. This study investigates the viability of biometric keypads. Results indicate that biometric keypads can differentiate authentic users from impostors even when a secure PIN has been compromised. Furthermore, it is shown that authentication accuracy can be improved through optimal PIN selection by avoiding correlated key combinations.