Password hardening based on keystroke dynamics
CCS '99 Proceedings of the 6th ACM conference on Computer and communications security
iButton Enrolment and Verification Requirements for the Pressure Sequence Smartcard Biometric
E-SMART '01 Proceedings of the International Conference on Research in Smart Cards: Smart Card Programming and Security
Java-Based Internet Biometric Authentication System
IEEE Transactions on Pattern Analysis and Machine Intelligence
Timing analysis of keystrokes and timing attacks on SSH
SSYM'01 Proceedings of the 10th conference on USENIX Security Symposium - Volume 10
Timing analysis of keystrokes and timing attacks on SSH
SSYM'01 Proceedings of the 10th conference on USENIX Security Symposium - Volume 10
Use of random time-intervals (RTIs) generation for biometric verification
Pattern Recognition
Account-Sharing Detection Through Keystroke Dynamics Analysis
International Journal of Electronic Commerce
Review Article: Biometric personal authentication using keystroke dynamics: A review
Applied Soft Computing
On the discriminability of keystroke feature vectors used in fixed text keystroke authentication
Pattern Recognition Letters
Information Sciences: an International Journal
A personal touch: recognizing users based on touch screen behavior
Proceedings of the Third International Workshop on Sensing Applications on Mobile Phones
Hi-index | 0.00 |
The keystroke dynamics of a computer user's login string provide a characteristic pattern that can be used for identity verification. Timing vectors for several hundred login attempts were collected for ten “valid” users and ten “forgers”, and classification analysis was applied to discriminate between them. Three different classifiers were applied, and in each case the key hold times were more effective features for discrimination than the interkey times. Best performance was achieved by an inductive learning classifier using both interkey and hold times. A high rate of typographical errors during login entry is reported. In practice, these are usually corrected errors-that is, they are strings which include backspaces to correct earlier errors-but their presence confounds the use of typing-style analysis as a practical means of securing access to computer systems