

User Identification Using Keystroke Dynamics
Abstract
Keywords
References
A Guven, I Sogukpinar, “Understanding users' keystroke patterns for computer access security”, Computers and Security, Vol. 22, No. 8. (December 2003), pp. 695-706
Anil K. Jain, Arun Ross and Salil Prabhakar2, “An Introduction to Biometric Recognition”, IEEE Transactions on Circuits and Systems for Video Technology, Special Issue on Image- and Video-Based Biometrics, Vol. 14, No. 1, January 2004.
Attila Meszaros, Zoltan Banko, Laszlo Czuni, “Strengthening Passwords by Keystroke Dynamics”, IEEE International Workshop on Intelligent Data Acquisition and Advanced Computing Systems: Technology and Applications, 6-8 September 2007
F. Bergadano, D. Gunetti, C. Picardi. “User Authentication through Keystroke Dynamics”, ACM Transactions on Information and System Security, Vol. 5, No. 4, November 2002, pp. 367–397.
Glaucya C. Boechat, Jeneffer C. Ferreira, and Edson C. B. Carvalho, Filho, “Using the Keystrokes Dynamic for Systems of Personal Security”, Proceedings Of World Academy Of Science, Engineering And Technology, Volume 18 December 2006 Issn 1307-6884
Gunetti and Picardi, “ Keystroke analysis of free text”, ACM Transactions on Information and System Security, volume 8, pages 312–347, 2005.
J.Mantyjarvi, J. Koivumaki, P. Vuori, “Keystroke Recognition for Virtual Keyboard” IEEE International Conference on Multimedia and Expo, Lausanne, Switzerland, Aug. 2002. pp. 429-432.
Joyce and Gupta, “Identity authentication based on keystroke latencies” Communications of the ACM, Volume 33, Issue 2, 168 - 176, 1990
Lane, David M., Napier, H. Albert, Batsell, Richard R. and Naman, John L. “Predicting the Skilled Use of Hierarchical Menus With the Keystroke-Level Model” In Human-Computer Interaction, 8 (2) pp. 185-192,1995
Lawrence O’Gorman, “Comparing Passwords, Tokens, and Biometrics for User Authentication”, Proceedings of the IEEE, Vol. 91, No. 12, Dec. 2003, pp. 2019-2040
Matyas, V., Jr. Riha, Z., “Toward reliable user authentication through biometrics” IEEE security and privacy, Volume: 1, Issue: 3, May-June 2003, 45- 49.
Mohammad S. Obaidat, Balqies Sadoun: “Verification of computer users using keystroke dynamics”, IEEE Transactions on Systems, Man, and Cybernetics, Part B 27(2): 261-269 (1997)
Montrose, F. & Rubin, A.D. “Keystroke dynamics as a biometric for authentication.” Future Generation Computer Systems, 16(4), 351-359, (2000).
Revett, K. and Khan, A., “Enhancing login security using keystroke hardening and keyboard gridding”, Proceedings of the IADIS MCCSIS, 2005.
S. Bleha, C. Slivinsky, B. Hussien, “Computer-Access Security Systems using Keystroke Dynamics”, IEEE Transactions on Pattern Analysis and Machine Intelligence, Vol.12 Issue: 12 Dec 1990, pp.1217-1222.
S.M Matyas, J Stapleton. “A Biometric Standard for Information Management and Security”, Computers & Security Vol.19 Issue: 2. 2000.pp.428-441
Refbacks
- There are currently no refbacks.

This work is licensed under a Creative Commons Attribution 3.0 License.