2015 IEEE International Conference on Research in Computational Intelligence and Communication Networks (ICRCICN) 2015
DOI: 10.1109/icrcicn.2015.7434246
|View full text |Cite
|
Sign up to set email alerts
|

Authentication through keystrokes: What you type and how you type

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
4
0

Year Published

2018
2018
2023
2023

Publication Types

Select...
3
2

Relationship

0
5

Authors

Journals

citations
Cited by 5 publications
(4 citation statements)
references
References 15 publications
0
4
0
Order By: Relevance
“…These methods consist of the verification and validation of the relationship between the document and the owner. As defined in [6], we consider in this paper, three common factors used for authentication: (i) something that the user is or does, as for example biometric characteristics and behavioral characteristics, (ii) something that user knows, such as PIN, passwords, one-time password (OTP) and (iii) something that the user has, like for example public-key cryptography (PKC) technologies.…”
Section: User Authenticationmentioning
confidence: 99%
See 1 more Smart Citation
“…These methods consist of the verification and validation of the relationship between the document and the owner. As defined in [6], we consider in this paper, three common factors used for authentication: (i) something that the user is or does, as for example biometric characteristics and behavioral characteristics, (ii) something that user knows, such as PIN, passwords, one-time password (OTP) and (iii) something that the user has, like for example public-key cryptography (PKC) technologies.…”
Section: User Authenticationmentioning
confidence: 99%
“…In the context of the ID, user authentication is the process to verify and validate the relationship between the document and its owner. This process is based on the concept of strong authentication defined on three factors: something the person has (a card), something the person knows (a PIN) and something the person is or does (its fingerprint or signature) [6]. The combination of those factors generates a more secure or strong authentication for the identification of the person itself.…”
Section: Introductionmentioning
confidence: 99%
“…c. Authentication: Authentication is the process to verify and validate the relationship between the document and its owner. The user must be authenticated using one or more factor that generally falls into one of four categories: something that the person is, something that the person has, something that the person knows, and something that the person does [10]. Lifecycle Management: Provide ease to manage and organize the identity system, such as updating the status and content of digital identities.…”
Section: The Identity Lifecyclementioning
confidence: 99%
“…Certainly, blockchain network combined with user's authentication and identification processes can be applied to overcome the aforementioned issues and offering additional services. In the ID context, user's authentication is the process to verify and validate the relationship between the document and its owner, these processes are based on the concept of strong authentication, which consists of the verification of four factors: something that the person has (Card), something that the person knows (PIN), something that the person is (Fingerprint) and something that the person does (Signature) [12].…”
Section: Introductionmentioning
confidence: 99%