Computer-Access Security Systems Using Keystroke Dynamics
IEEE Transactions on Pattern Analysis and Machine Intelligence
Keystroke dynamics as a biometric for authentication
Future Generation Computer Systems - Special issue on security on the Web
Pattern Recognition with Fuzzy Objective Function Algorithms
Pattern Recognition with Fuzzy Objective Function Algorithms
Typing Patterns: A Key to User Identification
IEEE Security and Privacy
Pupil and Iris Localization for Iris Recognition in Mobile Phones
SNPD-SAWN '06 Proceedings of the Seventh ACIS International Conference on Software Engineering, Artificial Intelligence, Networking, and Parallel/Distributed Computing
Identity authentication using improved online signature verification method
Pattern Recognition Letters
Authenticating mobile phone users using keystroke analysis
International Journal of Information Security
Handbook of Biometrics
Mobile Phones Security Using Biometrics
ICCIMA '07 Proceedings of the International Conference on Computational Intelligence and Multimedia Applications (ICCIMA 2007) - Volume 04
Score Based Biometric Template Selection and Update
FGCN '08 Proceedings of the 2008 Second International Conference on Future Generation Communication and Networking - Volume 03
Authenticating user using keystroke dynamics and finger pressure
CCNC'09 Proceedings of the 6th IEEE Conference on Consumer Communications and Networking Conference
Keystroke dynamics with low constraints SVM based passphrase enrollment
BTAS'09 Proceedings of the 3rd IEEE international conference on Biometrics: Theory, applications and systems
Biometric access control through numerical keyboards based on keystroke dynamics
ICB'06 Proceedings of the 2006 international conference on Advances in Biometrics
Gaussian Mixture Modeling of Keystroke Patterns for Biometric Applications
IEEE Transactions on Systems, Man, and Cybernetics, Part C: Applications and Reviews
Verification of computer users using keystroke dynamics
IEEE Transactions on Systems, Man, and Cybernetics, Part B: Cybernetics
Using global knowledge of users' typing traits to attack keystroke biometrics templates
Proceedings of the thirteenth ACM multimedia workshop on Multimedia and security
Continuous Remote Mobile Identity Management Using Biometric Integrated Touch-Display
MICROW '12 Proceedings of the 2012 45th Annual IEEE/ACM International Symposium on Microarchitecture Workshops
Hi-index | 0.00 |
In this paper we discuss the feasibility of employing keystroke dynamics to perform user verification on mobile phones. Specifically, after having introduced a new statistical classifier, we analyze the discriminative capabilities of the features extracted from the acquired patterns, in order to determine which ones guarantee the best authentication performances. The effectiveness of using template selection techniques for keystroke verification is also investigated. The obtained experimental results indicate that the proposed method can be effectively employed to authenticate mobile phones users, even in operational contexts where the number of enrollment acquisition is kept low.