Identity authentication based on keystroke latencies
Communications of the ACM
Pass-algorithms: a user validation scheme based on knowledge of secret algorithms
Communications of the ACM
Password security: a case history
Communications of the ACM
User identification based on game-play activity patterns
Proceedings of the 6th ACM SIGCOMM workshop on Network and system support for games
Hi-index | 0.01 |
Blometric methods can be used for people recognition using their own human characteristics and differences guaranteeing interests of both the controller and the controlled.The blometric factors retained here are Fingerprints, Retina vascularisation, Voice, Geometry of the hand, Dynamics of signature, Keyboard latencies, Genetic fingerprintingA comparison of performance of such methods including general remarks are given to show the necessity of establishing standards for objective comparison for validation and also for improving algorithms.Biometric methods for identification of people are in progress and can stengthen computer security. Biometrics represents the concept "to be". It can be mixed with the two other concepts "to know" and "to have" to solve security weaknesses like the "fuzzy password choice problem."