2011
DOI: 10.1016/j.asoc.2010.08.003
|View full text |Cite
|
Sign up to set email alerts
|

Biometric personal authentication using keystroke dynamics: A review

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
99
0
1

Year Published

2011
2011
2022
2022

Publication Types

Select...
6
1
1

Relationship

0
8

Authors

Journals

citations
Cited by 204 publications
(100 citation statements)
references
References 51 publications
0
99
0
1
Order By: Relevance
“…Table 4 illustrates the differences of the used protocols in this research area for some major studies. The performance comparison of these methods is quite impossible, as stated in (Crawford, n.d.;Giot et al, 2009a;Karnan et al, 2011;Killourhy & Maxion, 2009), due to several reasons. First, most of these studies have used different protocols for their data acquisition, which is totally understandable due to the existence of different kinds of keystroke dynamics systems (static, continuous, dynamic) that require different acquisition protocols.…”
Section: Db 5 Fixed Textmentioning
confidence: 99%
See 1 more Smart Citation
“…Table 4 illustrates the differences of the used protocols in this research area for some major studies. The performance comparison of these methods is quite impossible, as stated in (Crawford, n.d.;Giot et al, 2009a;Karnan et al, 2011;Killourhy & Maxion, 2009), due to several reasons. First, most of these studies have used different protocols for their data acquisition, which is totally understandable due to the existence of different kinds of keystroke dynamics systems (static, continuous, dynamic) that require different acquisition protocols.…”
Section: Db 5 Fixed Textmentioning
confidence: 99%
“…By analysing the behavior of these measures comparing the recognition performance, they find that it is possible to improve performance by asking users to artificially add pauses (helped by cues for being synchronized) when typing the password. Karnan et al (2011) propose an interesting review of most of the keystroke dynamics recognition methods.…”
Section: Improving the Performancementioning
confidence: 99%
“…Various advantages have been offered by the keystroke behavior for verification purposes. It facilitates a cost effective, user friendly and continuous verification with a potential for high accuracy (Karnan, Akila, & Krishnaraj, 2011). However, some of the challenges facing keystroke dynamics authentication have been revealed in (Banerjee & Woodard, 2012).…”
Section: ) Hand Gesturesmentioning
confidence: 99%
“…In other words, biometric authentication is base on verifying personal attributes of users [11]. Furthermore, biometric authentication has some benefit as compared to other techniques [14].…”
Section: Literature Reviewmentioning
confidence: 99%
“…Therefore, biometric authentication [11,13] is a strong authentication mechanism by providing the factor what we are and what we know [28]. In addition, it is able to identify users based on their unique characteristic [35], and it is more reliable, because it is so difficult for user to pretend as other user by using physical or behavioral biometric authentication.…”
Section: Introductionmentioning
confidence: 99%