2016
DOI: 10.25255/jss.2016.5.1.29.41
|View full text |Cite
|
Sign up to set email alerts
|

A Survey of behavioral authentication using keystroke dynamics: Touch screens and mobile devices

Abstract: Nowadays most systems became computerized and use internet for remote access, including systems which have critical and sensitive data such as banks and governmental institutions. This led to the huge need for a reliable and efficient authentication system to secure data. User authentication is mostly done using passwords. But it is not a sufficient way to use just a password since it has many drawbacks, like guessing them, brute force attacks, key-loggers and social engineering. Additional authentication proc… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
6
0

Year Published

2017
2017
2023
2023

Publication Types

Select...
3
3
1

Relationship

0
7

Authors

Journals

citations
Cited by 7 publications
(6 citation statements)
references
References 17 publications
0
6
0
Order By: Relevance
“…Knowledge-based technique is commonly used to secure the access for systems [14]. The two famous examples are the pin and password.…”
Section: Knowledge-based Methodsmentioning
confidence: 99%
See 1 more Smart Citation
“…Knowledge-based technique is commonly used to secure the access for systems [14]. The two famous examples are the pin and password.…”
Section: Knowledge-based Methodsmentioning
confidence: 99%
“…The use of human characteristics is the best solution compared to the user that personally knows and possesses [14]. In other words, biometric-based method cannot be forgotten or lost in contrast to token, smart card, and password [24].…”
Section: Biometric-based Methodsmentioning
confidence: 99%
“…A dedicated dataset for mobile and touch screen devices are still few in literature and they were not covering all the provided non-timing features we mentioned in the literature. So, we are in bad needs for public touch screen devices benchmarks [20][21][22][23][24][25][26][27][28].…”
Section: Benchmarking Datasets and Challengesmentioning
confidence: 99%
“…The notation of MLP classifier (x,y,z) represents the number of neurons in each layer with three layers structure. For example, if we used the notation MLP (10,10,20) to represent MLP structure; then we have three layer with 10, 10, and 20 nodes in each layer respectively. Fig.…”
Section: Neural Network Classifier (Nn)mentioning
confidence: 99%
“…Saini, Kaur, and Bhatia [96] and Saifan et al [95] presented a comprehensive review on keystroke dynamics research -especially for touch screen and mobile devices. But these papers are not up to date as these were published in 2016.…”
mentioning
confidence: 99%