Identity authentication based on keystroke dynamics for mobile device users

[1]  Heinrich Hußmann,et al.  Touch me once and i know it's you!: implicit authentication based on touch screen patterns , 2012, CHI.

[2]  Fabian Monrose,et al.  Keystroke dynamics as a biometric for authentication , 2000, Future Gener. Comput. Syst..

[3]  Xiaohong Guan,et al.  Performance Analysis of Touch-Interaction Behavior for Active Smartphone Authentication , 2016, IEEE Transactions on Information Forensics and Security.

[4]  Kim-Kwang Raymond Choo,et al.  Context Aware Ubiquitous Biometrics in Edge of Military Things , 2017, IEEE Cloud Computing.

[5]  Yanggon Kim,et al.  Pupil and Iris Localization for Iris Recognition in Mobile Phones , 2006, Seventh ACIS International Conference on Software Engineering, Artificial Intelligence, Networking, and Parallel/Distributed Computing (SNPD'06).

[6]  Vir V. Phoha,et al.  Discriminative Power of Typing Features on Desktops, Tablets, and Phones for User Identification , 2020, ACM Trans. Priv. Secur..

[7]  Joseph Bonneau,et al.  The Science of Guessing: Analyzing an Anonymized Corpus of 70 Million Passwords , 2012, 2012 IEEE Symposium on Security and Privacy.

[8]  Andrew Beng Jin Teoh,et al.  Improving keystroke dynamics authentication system via multiple feature fusion scheme , 2012, Proceedings Title: 2012 International Conference on Cyber Security, Cyber Warfare and Digital Forensic (CyberSec).

[9]  Terence Sim,et al.  Keystroke Dynamics in a General Setting , 2007, ICB.

[10]  Mauro Conti,et al.  I Sensed It Was You: Authenticating Mobile Users with Sensor-Enhanced Keystroke Dynamics , 2014, DIMVA.

[11]  Rama Chellappa,et al.  Face-based Active Authentication on mobile devices , 2015, 2015 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP).

[12]  Sahin Albayrak,et al.  Continuous and non-intrusive identity verification in real-time environments based on free-text keystroke dynamics , 2011, 2011 International Joint Conference on Biometrics (IJCB).

[13]  Colin Boyd,et al.  User-representative feature selection for keystroke dynamics , 2011, 2011 5th International Conference on Network and System Security.

[14]  Michele Nappi,et al.  Eye-Movement and Touch Dynamics: A Proposed Approach for Activity Recognition of a Web User , 2019, 2019 15th International Conference on Signal-Image Technology & Internet-Based Systems (SITIS).

[15]  D. Gentner Keystroke Timing in Transcription Typing , 1983 .

[16]  Claudia Picardi,et al.  Keystroke analysis of free text , 2005, TSEC.

[17]  Qun Jin,et al.  User role identification based on social behavior and networking analysis for information dissemination , 2017, Future Gener. Comput. Syst..

[18]  Pravin Yannawar,et al.  Overview of fingerprint recognition system , 2016, 2016 International Conference on Electrical, Electronics, and Optimization Techniques (ICEEOT).

[19]  Kevin I-Kai Wang,et al.  Deep-Learning-Enhanced Human Activity Recognition for Internet of Healthcare Things , 2020, IEEE Internet of Things Journal.

[20]  Cheng-Jung Tsai,et al.  Mining a new biometrics to improve the accuracy of keystroke dynamics-based authentication system on free-text , 2019, Appl. Soft Comput..

[21]  Xiaohong Guan,et al.  Performance Analysis of Motion-Sensor Behavior for User Authentication on Smartphones , 2016, Sensors.

[22]  Michele Nappi,et al.  Biometric data on the edge for secure, smart and user tailored access to cloud services , 2019, Future Gener. Comput. Syst..