Identity authentication based on keystroke latencies
Communications of the ACM
Authentication via keystroke dynamics
Proceedings of the 4th ACM conference on Computer and communications security
Password hardening based on keystroke dynamics
CCS '99 Proceedings of the 6th ACM conference on Computer and communications security
User authentication through keystroke dynamics
ACM Transactions on Information and System Security (TISSEC)
User Authentication via Neural Network
AIMSA '00 Proceedings of the 9th International Conference on Artificial Intelligence: Methodology, Systems, and Applications
iButton Enrolment and Verification Requirements for the Pressure Sequence Smartcard Biometric
E-SMART '01 Proceedings of the International Conference on Research in Smart Cards: Smart Card Programming and Security
Keystroke analysis of free text
ACM Transactions on Information and System Security (TISSEC)
Timing analysis of keystrokes and timing attacks on SSH
SSYM'01 Proceedings of the 10th conference on USENIX Security Symposium - Volume 10
Timing analysis of keystrokes and timing attacks on SSH
SSYM'01 Proceedings of the 10th conference on USENIX Security Symposium - Volume 10
An evolutionary keystroke authentication based on ellipsoidal hypothesis space
Proceedings of the 9th annual conference on Genetic and evolutionary computation
Identity verification through dynamic keystroke analysis
Intelligent Data Analysis
Cognitive security for personal devices
Proceedings of the 1st ACM workshop on Workshop on AISec
Keystroke-Based User Identification on Smart Phones
RAID '09 Proceedings of the 12th International Symposium on Recent Advances in Intrusion Detection
A novel approach to design of user re-authentication systems
BTAS'09 Proceedings of the 3rd IEEE international conference on Biometrics: Theory, applications and systems
PRICAI'10 Proceedings of the 11th Pacific Rim international conference on Trends in artificial intelligence
Typing Biometrics: Impact of Human Learning on Performance Quality
Journal of Data and Information Quality (JDIQ)
Fuzzy approach in biometric authentication by keystroke dynamics
FS'05 Proceedings of the 6th WSEAS international conference on Fuzzy systems
Using global knowledge of users' typing traits to attack keystroke biometrics templates
Proceedings of the thirteenth ACM multimedia workshop on Multimedia and security
Dealing with different languages and old profiles in keystroke analysis of free text
AI*IA'05 Proceedings of the 9th conference on Advances in Artificial Intelligence
Keystroke analysis of different languages: a case study
IDA'05 Proceedings of the 6th international conference on Advances in Intelligent Data Analysis
Examining a Large Keystroke Biometrics Dataset for Statistical-Attack Openings
ACM Transactions on Information and System Security (TISSEC)
Hi-index | 0.02 |