Machine Learning
Communications of the ACM
Keystroke dynamics as a biometric for authentication
Future Generation Computer Systems - Special issue on security on the Web
An introduction to support Vector Machines: and other kernel-based learning methods
An introduction to support Vector Machines: and other kernel-based learning methods
A Tutorial on Support Vector Machines for Pattern Recognition
Data Mining and Knowledge Discovery
Pattern Classification (2nd Edition)
Pattern Classification (2nd Edition)
Biometrics and Network Security
Biometrics and Network Security
ICPR '04 Proceedings of the Pattern Recognition, 17th International Conference on (ICPR'04) Volume 2 - Volume 02
The Critical Factors Affecting Hospital Adoption of Mobile Nursing Technologies in Taiwan
HICSS '05 Proceedings of the Proceedings of the 38th Annual Hawaii International Conference on System Sciences (HICSS'05) - Track 6 - Volume 06
HIT and MIS: implications of health information technology and medical information systems
Communications of the ACM - The digital society
Learning User Profile from Traces
SAINT-W '05 Proceedings of the 2005 Symposium on Applications and the Internet Workshops
Journal of Information Science
Development of a Measure for the Organizational Learning Construct
Journal of Management Information Systems
Behavioural biometrics: a survey and classification
International Journal of Biometrics
Electronic capture and analysis of fraudulent behavioral patterns: an application to identity fraud
Electronic capture and analysis of fraudulent behavioral patterns: an application to identity fraud
Authenticating user using keystroke dynamics and finger pressure
CCNC'09 Proceedings of the 6th IEEE Conference on Consumer Communications and Networking Conference
Keystroke pressure-based typing biometrics authentication system using support vector machines
ICCSA'07 Proceedings of the 2007 international conference on Computational science and Its applications - Volume Part II
Trust and TAM in online shopping: an integrated model
MIS Quarterly
Verification of computer users using keystroke dynamics
IEEE Transactions on Systems, Man, and Cybernetics, Part B: Cybernetics
Hi-index | 0.00 |
Pervasive online applications are changing the way people perform routine activities. But while providing convenience to individuals and organizations, these applications can pose a significant remote user authentication challenge. Current authentication systems can be strengthened by adding an additional biometric layer to an existing authentication process. This paper addresses implementing such a solution by 1 presenting a novel biometric method that uses key-press pressure and timing patterns from a typed password to determine whether the person typing it is its true owner even with a compromised PIN; and 2 investigating differences in perceptions of biometric keypads between two user groups, nursing and computing majors. Results reveal that combining pressure and timing patterns leads to better authentication compared with timing patterns alone. Furthermore, nursing majors are more cautious in accepting biometric keypad technology than computing majors, suggesting that care must be taken when introducing such technologies to different groups of people.