Identifying computer users with authentication devices (tokens)
Computers and Security
Security in computing
A survey of password mechanisms: weaknesses and potential improvement, part 1
Computers and Security
Computer security basics
Neural networks and fuzzy systems: a dynamical systems approach to machine intelligence
Neural networks and fuzzy systems: a dynamical systems approach to machine intelligence
The fuzzy systems handbook: a practitioner's guide to building, using, and maintaining fuzzy systems
The fuzzy systems handbook: a practitioner's guide to building, using, and maintaining fuzzy systems
A methodology for improving computer access security
Computers and Security
Acquisition of Typewriting Skills
Acquisition of Typewriting Skills
Fuzzy Logic
Keystroke statistical learning model for web authentication
ASIACCS '07 Proceedings of the 2nd ACM symposium on Information, computer and communications security
An evolutionary keystroke authentication based on ellipsoidal hypothesis space
Proceedings of the 9th annual conference on Genetic and evolutionary computation
Enhanced password authentication through keystroke typing characteristics
AIAP'07 Proceedings of the 25th conference on Proceedings of the 25th IASTED International Multi-Conference: artificial intelligence and applications
A machine learning approach to keystroke dynamics based user authentication
International Journal of Electronic Security and Digital Forensics
Expert Systems with Applications: An International Journal
Account-Sharing Detection Through Keystroke Dynamics Analysis
International Journal of Electronic Commerce
Anomaly detection of masquerders based upon typing biometrics and probabilistic neural network
Journal of Computing Sciences in Colleges
On the use of rough sets for user authentication via keystroke dynamics
EPIA'07 Proceedings of the aritficial intelligence 13th Portuguese conference on Progress in artificial intelligence
Keystroke pressure-based typing biometrics authentication system using support vector machines
ICCSA'07 Proceedings of the 2007 international conference on Computational science and Its applications - Volume Part II
Keystroke dynamics in password authentication enhancement
Expert Systems with Applications: An International Journal
PRICAI'10 Proceedings of the 11th Pacific Rim international conference on Trends in artificial intelligence
Review Article: Biometric personal authentication using keystroke dynamics: A review
Applied Soft Computing
Quantifying the quality of web authentication mechanisms: a usability perspective
Journal of Web Engineering
Journal of Systems and Software
Information Sciences: an International Journal
Hi-index | 0.00 |
This article presents a methodology for the reinforcement of password authentication through typing biometrical mechanisms. Typing biometrics is the analysis of the keystroke patterns unique to each user. This analysis is transparent-indiscernible to users-while they are trying to gain system access via a password-authentication mechanism in the normal way (by entering a user ID and password string). The analysis employs fuzzy logic, which has great potential to categorize each user's typing patterns. The integration of fuzzy logic-based typing biometrics with current password mechanisms, which constitute the most universal authentication device, can greatly enhance security.