Identity authentication based on keystroke latencies
Communications of the ACM
Dynamic identity verification via keystroke characteristics
International Journal of Man-Machine Studies
Password hardening based on keystroke dynamics
CCS '99 Proceedings of the 6th ACM conference on Computer and communications security
Communications of the ACM
Keystroke dynamics as a biometric for authentication
Future Generation Computer Systems - Special issue on security on the Web
Timing analysis of keystrokes and timing attacks on SSH
SSYM'01 Proceedings of the 10th conference on USENIX Security Symposium - Volume 10
Identification in electronic networks: characteristics of e-identifiers
ICEC '06 Proceedings of the 8th international conference on Electronic commerce: The new e-commerce: innovations for conquering current barriers, obstacles and limitations to conducting successful business on the internet
On the equalization of keystroke timing histograms
Pattern Recognition Letters
Keystroke statistical learning model for web authentication
ASIACCS '07 Proceedings of the 2nd ACM symposium on Information, computer and communications security
Enhanced password authentication through keystroke typing characteristics
AIAP'07 Proceedings of the 25th conference on Proceedings of the 25th IASTED International Multi-Conference: artificial intelligence and applications
User identification based on game-play activity patterns
Proceedings of the 6th ACM SIGCOMM workshop on Network and system support for games
A machine learning approach to keystroke dynamics based user authentication
International Journal of Electronic Security and Digital Forensics
The Effect of Clock Resolution on Keystroke Dynamics
RAID '08 Proceedings of the 11th international symposium on Recent Advances in Intrusion Detection
Expert Systems with Applications: An International Journal
Use of random time-intervals (RTIs) generation for biometric verification
Pattern Recognition
Battle of Botcraft: fighting bots in online games with human observational proofs
Proceedings of the 16th ACM conference on Computer and communications security
Identity theft, computers and behavioral biometrics
ISI'09 Proceedings of the 2009 IEEE international conference on Intelligence and security informatics
Account-Sharing Detection Through Keystroke Dynamics Analysis
International Journal of Electronic Commerce
Keystroke-based authentication by key press intervals as a complementary behavioral biometric
SMC'09 Proceedings of the 2009 IEEE international conference on Systems, Man and Cybernetics
An 'object-use fingerprint': the use of electronic sensors for human identification
UbiComp '07 Proceedings of the 9th international conference on Ubiquitous computing
PRICAI'10 Proceedings of the 11th Pacific Rim international conference on Trends in artificial intelligence
Why did my detector do that?!: predicting keystroke-dynamics error rates
RAID'10 Proceedings of the 13th international conference on Recent advances in intrusion detection
Review Article: Biometric personal authentication using keystroke dynamics: A review
Applied Soft Computing
Keystroke dynamics authentication for mobile phones
Proceedings of the 2011 ACM Symposium on Applied Computing
Using global knowledge of users' typing traits to attack keystroke biometrics templates
Proceedings of the thirteenth ACM multimedia workshop on Multimedia and security
An efficient user verification system via mouse movements
Proceedings of the 18th ACM conference on Computer and communications security
Reliable keystroke biometric system based on a small number of keystroke samples
ETRICS'06 Proceedings of the 2006 international conference on Emerging Trends in Information and Communication Security
Keystroke biometric system using wavelets
ICB'06 Proceedings of the 2006 international conference on Advances in Biometrics
Enhancing login security through the use of keystroke input dynamics
ICB'06 Proceedings of the 2006 international conference on Advances in Biometrics
The effectiveness of artificial rhythms and cues in keystroke dynamics based user authentication
WISI'06 Proceedings of the 2006 international conference on Intelligence and Security Informatics
Dependable and Historic Computing
User authentication via keystroke dynamics based on difference subspace and slope correlation degree
Digital Signal Processing
A personal touch: recognizing users based on touch screen behavior
Proceedings of the Third International Workshop on Sensing Applications on Mobile Phones
User classification for keystroke dynamics authentication
ICB'07 Proceedings of the 2007 international conference on Advances in Biometrics
Continual retraining of keystroke dynamics based authenticator
ICB'07 Proceedings of the 2007 international conference on Advances in Biometrics
Proceedings of the 11th International Conference on Mobile and Ubiquitous Multimedia
Survey and research direction on online game security
Proceedings of the Workshop at SIGGRAPH Asia
A Keystroke Biometric Systemfor Long-Text Input
International Journal of Information Security and Privacy
CASA: context-aware scalable authentication
Proceedings of the Ninth Symposium on Usable Privacy and Security
Examining a Large Keystroke Biometrics Dataset for Statistical-Attack Openings
ACM Transactions on Information and System Security (TISSEC)
Keystroke timing analysis of on-the-fly web apps
ACNS'13 Proceedings of the 11th international conference on Applied Cryptography and Network Security
Keystroke biometrics: the user perspective
Proceedings of the 4th ACM conference on Data and application security and privacy
Hi-index | 0.00 |
The deficiencies of traditional password-based access systems have become more acute as these systems have grown in size and scope. Researchers are actively investigating ways to improve the security of password systems or offer replacements. One category of improvements uses keystroke biometrics, an approach which seeks to identify an individual by their typing characteristics. Since 1980, a number of techniques have been proposed for accurately harnessing keystroke dynamics for system authentication and other novel uses. But do these systems deliver on their promise to increase system security and simultaneously ease the burden of logging into systems and remembering passwords? And do databases of users' keystroke profiles present additional privacy concerns? In the following article, the authors address these issues while surveying the last quarter-century's developments, comparing results from the field with both well-known and newly proposed metrics, and examining potential roadblocks to widespread implementation of keystroke biometrics.