Identity authentication based on keystroke latencies
Communications of the ACM
Computer-Access Security Systems Using Keystroke Dynamics
IEEE Transactions on Pattern Analysis and Machine Intelligence
Authentication via keystroke dynamics
Proceedings of the 4th ACM conference on Computer and communications security
Pass-algorithms: a user validation scheme based on knowledge of secret algorithms
Communications of the ACM
User authentication through keystroke dynamics
ACM Transactions on Information and System Security (TISSEC)
OPA: A One-Time Password System
ICPPW '02 Proceedings of the 2002 International Conference on Parallel Processing Workshops
The domino effect of password reuse
Communications of the ACM - Human-computer etiquette
Verification of computer users using keystroke dynamics
IEEE Transactions on Systems, Man, and Cybernetics, Part B: Cybernetics
Hi-index | 0.00 |
No security mechanism has been deemed secure enough. Thus, the research into application security has ventured into the alternative technologies that consider the user aspects of implementation. In this paper, we present an enhanced approach to password security based on Key-Pattern Analysis (KPA). Our approach relies on its two focal pillars, inter and intra timing, which are stretched along the lines of increasing password entropy, trouncing the habit factor and finally, trimming down the error margin under an appropriate user-fitting technique. Other user optimisation techniques include token authentication and character-sound recognition. By serving notice as to the immense power of intra timing in reliable authentication, we amount to the development of beat-like passwords as a means of strengthening the overall KPA mechanism.