Proceedings of the Fifth Mexican International Conference in Computer Science, 2004. ENC 2004.
DOI: 10.1109/enc.2004.1342604
|View full text |Cite
|
Sign up to set email alerts
|

Deterring password sharing:user authentication via fuzzy c-means clustering applied to keystroke biometric data

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2

Citation Types

0
19
0

Publication Types

Select...
4
3

Relationship

0
7

Authors

Journals

citations
Cited by 19 publications
(19 citation statements)
references
References 5 publications
0
19
0
Order By: Relevance
“…Fuzzy c-Means clustering [71] Provides additional flexibility regarding membership and removes ambiguity like whether a point belongs to the cluster or not 8…”
Section: Other Approachesmentioning
confidence: 99%
See 1 more Smart Citation
“…Fuzzy c-Means clustering [71] Provides additional flexibility regarding membership and removes ambiguity like whether a point belongs to the cluster or not 8…”
Section: Other Approachesmentioning
confidence: 99%
“…It gives a score based on the algorithm specified using a simple global alignment technique. In [71], Direction similarity measure and Gaussian probability density function [67] A weighted sum rule is applied by fusing the Gaussian scores and the DSM to enhance the final result with an EER of 9.96% 4…”
Section: Other Approachesmentioning
confidence: 99%
“…The handwritten signature has its parallel on the keyboard in that the same neuro-physiological factors that account for its uniqueness are also presents in a typing pattern as detected in the keystroke latencies between two consecutive keystrokes. The typing patterns of a person using a computer keyboard is a distinctive feature that, even when it is not as precise as others in terms of entropy and classification power [10], has the advantage of not requiring costly equipment and software to be implemented. From the measured features, the dwell time and flight times are extracted to a form a pattern used to represent a computer user.…”
Section: Introductionmentioning
confidence: 99%
“…For example, it has been observed that web sites of related activism groups are linked to each other through hyperlinks, creating their own community network [6]. A good research framework would include an effective method to identify such networks and the roles of the web sites in the networks.…”
Section: Introductionmentioning
confidence: 99%
“…Later Araujo, et al [4] proposed a thorough study of recognition system by introducing biometrics characteristics. Some study improved the recognition rate by increasing the computation complexity [5][6][7][8]. Furthermore, the massive use of mobile devices in recent years demands simpler methods with similar level of security, which poses challenge in tradeoff for advance methods.…”
mentioning
confidence: 99%