Al-Athari et al., 2014 - Google Patents
Selection of the Best threshold in Biometric Authentication by Exhaustive Statistical Pre-TestingAl-Athari et al., 2014
View PDF- Document ID
- 10760205228773939713
- Author
- Al-Athari F
- Hussain A
- Publication year
- Publication venue
- International Journal of Computer and Information Technology
External Links
Snippet
This paper presents a new approach to identify and improve the best key typing speed of the user when he/she enters the password in order to be used for authentication purpose. Keystroke authentication is considered an advanced authentication method in that it …
- 238000000034 method 0 abstract description 8
Similar Documents
| Publication | Publication Date | Title |
|---|---|---|
| Matyas et al. | Toward reliable user authentication through biometrics | |
| Prabhakar et al. | Biometric recognition: Security and privacy concerns | |
| US7864987B2 (en) | Methods and systems for secured access to devices and systems | |
| Bhatt et al. | Keystroke dynamics for biometric authentication—A survey | |
| US20170227995A1 (en) | Method and system for implicit authentication | |
| Buriro et al. | Dialerauth: A motion-assisted touch-based smartphone user authentication scheme | |
| Saevanee et al. | Text-based active authentication for mobile devices | |
| Giot et al. | Keystroke dynamics authentication for collaborative systems | |
| Babaeizadeh et al. | Keystroke dynamic authentication in mobile cloud computing | |
| Dholi et al. | Typing pattern recognition using keystroke dynamics | |
| Wahab et al. | Utilizing Keystroke Dynamics as Additional Security Measure to Protect Account Recovery Mechanism [Utilizing Keystroke Dynamics as Additional Security Measure to Protect Account Recovery Mechanism] | |
| Saifan et al. | A Survey of behavioral authentication using keystroke dynamics: Touch screens and mobile devices | |
| JP5903257B2 (en) | Authentication system, registration device, and authentication device | |
| D'lima et al. | Password authentication using keystroke biometrics | |
| De Magalhães et al. | An improved statistical keystroke dynamics algorithm | |
| Al-Athari et al. | Selection of the Best threshold in Biometric Authentication by Exhaustive Statistical Pre-Testing | |
| Rudrapal et al. | Improvisation of biometrics authentication and identification through keystrokes pattern analysis | |
| Saini et al. | Authenticating mobile phone user using keystroke dynamics | |
| Avasthi et al. | Biometric authentication techniques: a study on keystroke dynamics | |
| Khare et al. | Behavioural biometrics and cognitive security authentication comparison study | |
| Iyapparaja et al. | Enhancing user authentication through keystroke dynamics analysis using isolation forest algorithm | |
| Hoobi | Keystroke dynamics authentication based on Naïve Bayes classifier | |
| Abo-Alian et al. | Authentication as a service for cloud computing | |
| Primo | Keystroke-based continuous authentication while listening to music on your smart-phone | |
| Sanghi et al. | Survey, applications and security of keystroke dynamics for user authentication |