Verifying identity via keystroke characteristics
International Journal of Man-Machine Studies
Verification of user identity via keyboard characteristics
Human factors in management information systems
Identity authentication based on keystroke latencies
Communications of the ACM
Computer-Access Security Systems Using Keystroke Dynamics
IEEE Transactions on Pattern Analysis and Machine Intelligence
Password authentication using Newton's interpolating polynomials
Information Systems
Handbook of theoretical computer science (vol. A)
UNIX password security—ten years later
CRYPTO '89 Proceedings on Advances in cryptology
Password authentication without using a password table
Information Processing Letters
International Journal of Human-Computer Studies
Authentication via keystroke dynamics
Proceedings of the 4th ACM conference on Computer and communications security
Password security: a case history
Communications of the ACM
Communications of the ACM
Handbook of Applied Cryptography
Handbook of Applied Cryptography
Computers and Intractability: A Guide to the Theory of NP-Completeness
Computers and Intractability: A Guide to the Theory of NP-Completeness
Improved Decoding of Reed-Solomon and Algebraic-Geometric Codes
FOCS '98 Proceedings of the 39th Annual Symposium on Foundations of Computer Science
Computer user verification using login string keystroke dynamics
IEEE Transactions on Systems, Man, and Cybernetics, Part A: Systems and Humans
User authentication through keystroke dynamics
ACM Transactions on Information and System Security (TISSEC)
Securing passwords against dictionary attacks
Proceedings of the 9th ACM conference on Computer and communications security
Polynomial Reconstruction Based Cryptography
SAC '01 Revised Papers from the 8th Annual International Workshop on Selected Areas in Cryptography
Secure smartcardbased fingerprint authentication
WBMA '03 Proceedings of the 2003 ACM SIGMM workshop on Biometrics methods and applications
Typing Patterns: A Key to User Identification
IEEE Security and Privacy
Reusable cryptographic fuzzy extractors
Proceedings of the 11th ACM conference on Computer and communications security
PalmHashing: a novel approach for cancelable biometrics
Information Processing Letters
Designs, Codes and Cryptography
Combining Crypto with Biometrics Effectively
IEEE Transactions on Computers
IEEE Transactions on Pattern Analysis and Machine Intelligence
Discovering the software process by means of stochastic workflow analysis
Journal of Systems Architecture: the EUROMICRO Journal - Special issue: AGILE methodologies for software production
Timing analysis of keystrokes and timing attacks on SSH
SSYM'01 Proceedings of the 10th conference on USENIX Security Symposium - Volume 10
Generating Cancelable Fingerprint Templates
IEEE Transactions on Pattern Analysis and Machine Intelligence
Timing analysis of keystrokes and timing attacks on SSH
SSYM'01 Proceedings of the 10th conference on USENIX Security Symposium - Volume 10
Identity verification through dynamic keystroke analysis
Intelligent Data Analysis
EURASIP Journal on Advances in Signal Processing
User Identification Based on Handwritten Signatures with Haptic Information
EuroHaptics '08 Proceedings of the 6th international conference on Haptics: Perception, Devices and Scenarios
Secure Biometric Authentication with Improved Accuracy
ACISP '08 Proceedings of the 13th Australasian conference on Information Security and Privacy
Network Security Using Biometric and Cryptography
ACIVS '08 Proceedings of the 10th International Conference on Advanced Concepts for Intelligent Vision Systems
An agent-oriented mobile payment system secured using a biometrics approach
International Journal of Agent-Oriented Software Engineering
An Efficient and Flexible Scheme to Support Biometric-Based and Role-Based Access Control
Proceedings of the 2005 conference on Applied Public Key Infrastructure: 4th International Workshop: IWAP 2005
Systematic Construction of Iris-Based Fuzzy Commitment Schemes
ICB '09 Proceedings of the Third International Conference on Advances in Biometrics
PalmHashing: a novel approach for cancelable biometrics
Information Processing Letters
Biometric systems: privacy and secrecy aspects
IEEE Transactions on Information Forensics and Security - Special issue on electronic voting
Development of a new cryptographic construct using palmprint-based fuzzy vault
EURASIP Journal on Advances in Signal Processing - Special issue on recent advances in biometric systems: a signal processing perspective
Multi-biometrics based cryptographic key regeneration scheme
BTAS'09 Proceedings of the 3rd IEEE international conference on Biometrics: Theory, applications and systems
Biometrics-based identifiers for digital identity management
Proceedings of the 9th Symposium on Identity and Trust on the Internet
BogusBiter: A transparent protection against phishing attacks
ACM Transactions on Internet Technology (TOIT)
Noisy polynomial interpolation and noisy chinese remaindering
EUROCRYPT'00 Proceedings of the 19th international conference on Theory and application of cryptographic techniques
Privacy-enhancing fingerprint authentication using cancelable templates with passwords
WISA'06 Proceedings of the 7th international conference on Information security applications: PartI
Fingerprint hardening with randomly selected chaff minutiae
CAIP'07 Proceedings of the 12th international conference on Computer analysis of images and patterns
A hybrid approach for generating secure and discriminating face template
IEEE Transactions on Information Forensics and Security
Robust iris verification for key management
Pattern Recognition Letters
Cancelable fingerprint templates using minutiae-based bit-strings
Journal of Network and Computer Applications
A novel algorithm of fingerprint encryption using minutiae-based transformation
Pattern Recognition Letters
Secure sketch for multiple secrets
ACNS'10 Proceedings of the 8th international conference on Applied cryptography and network security
Review Article: Biometric personal authentication using keystroke dynamics: A review
Applied Soft Computing
Increasing error tolerance in biometric systems
Proceedings of the 8th International Conference on Advances in Mobile Computing and Multimedia
ICCOMP'10 Proceedings of the 14th WSEAS international conference on Computers: part of the 14th WSEAS CSCC multiconference - Volume I
Fuzzy identity based signature with applications to biometric authentication
Computers and Electrical Engineering
Quantifying the quality of web authentication mechanisms: a usability perspective
Journal of Web Engineering
Problems of Information Transmission
Using global knowledge of users' typing traits to attack keystroke biometrics templates
Proceedings of the thirteenth ACM multimedia workshop on Multimedia and security
Multi-biometrics based crypto-biometric session key generation and sharing protocol
Proceedings of the thirteenth ACM multimedia workshop on Multimedia and security
An efficient user verification system via mouse movements
Proceedings of the 18th ACM conference on Computer and communications security
Biometric access control through numerical keyboards based on keystroke dynamics
ICB'06 Proceedings of the 2006 international conference on Advances in Biometrics
Automatic alignment of fingerprint features for fuzzy fingerprint vault
CISC'05 Proceedings of the First SKLOIS conference on Information Security and Cryptology
Secure remote authentication using biometric data
EUROCRYPT'05 Proceedings of the 24th annual international conference on Theory and Applications of Cryptographic Techniques
Fuzzy identity-based encryption
EUROCRYPT'05 Proceedings of the 24th annual international conference on Theory and Applications of Cryptographic Techniques
Biometric Security from an Information-Theoretical Perspective
Foundations and Trends in Communications and Information Theory
Keystroke dynamics in a general setting
ICB'07 Proceedings of the 2007 international conference on Advances in Biometrics
An anomaly based approach for HID attack detection using keystroke dynamics
CSS'12 Proceedings of the 4th international conference on Cyberspace Safety and Security
Proceedings of the 19th annual international conference on Mobile computing & networking
Hi-index | 0.00 |
We present a novel approach to improving the security of passwords. In our approach, the legitimate user's typing patterns (e.g., durations of keystrokes, and latencies between keystrokes) are combined with the user's password to generate a hardened password that is convincingly more secure than conventional passwords against both online and offline attackers. In addition, our scheme automatically adapts to gradual changes in a user's typing patterns while maintaining the same hardened password across multiple logins, for use in file encryption or other applications requiring a longterm secret key. Using empirical data and a prototype implementation of our scheme, we give evidence that our approach is viable in practice, in terms of ease of use, improved security, and performance