2013 13th International Symposium on Communications and Information Technologies (ISCIT) 2013
DOI: 10.1109/iscit.2013.6645856
|View full text |Cite
|
Sign up to set email alerts
|

Feasibility study on authentication based keystroke dynamic over touch-screen devices

Abstract: Currently, people uses mobile devices as a part of their lives. This leads to the risk of data leaking or stealing. Due to the security issue, there are many studies try to increase security in these devices. The authentication process was bringing to the device with hope that it will prevent users from the security's risk. Since the technology is developing fast, a new kind of risk comes to users without doubt. This study proposed a new study of feasibility to use keystroke dynamics on touchscreen devices. Us… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
17
0

Year Published

2015
2015
2023
2023

Publication Types

Select...
3
2
2

Relationship

0
7

Authors

Journals

citations
Cited by 17 publications
(19 citation statements)
references
References 9 publications
0
17
0
Order By: Relevance
“…In contrast to the common use of classifiers in this way [15,32,42,46], we thus strongly recommend to focus on anomaly detectors instead, when adding an implicit layer for password or PIN entry. …”
Section: Classification Vs Anomaly Detection Methodsmentioning
confidence: 99%
See 2 more Smart Citations
“…In contrast to the common use of classifiers in this way [15,32,42,46], we thus strongly recommend to focus on anomaly detectors instead, when adding an implicit layer for password or PIN entry. …”
Section: Classification Vs Anomaly Detection Methodsmentioning
confidence: 99%
“…They reported EERs between 3.65%-7.34% with distance-based anomaly detection evaluated in a single session. Other authors used a Bayesian Net to authenticate phone users in a passcode entry task with a grid of 16 symbols [32]. They reported 82.18% accuracy with temporal features and distances between subsequent touches.…”
Section: Behavioural Biometrics For Mobile Typingmentioning
confidence: 99%
See 1 more Smart Citation
“…There are three factors in authentication. 1) Knowledge factor, 2) possession factor and 3) inherence factor [9]. The knowledge factor authenticates based on something the user knows, such as PIN, Password, and Pattern.…”
Section: Background and Related Workmentioning
confidence: 99%
“…Combining start nodes with lengths gives a microscopic view of the patterns. Table 5 shows the number of patterns that are usable when each node is chosen as the starting and having variable length (4)(5)(6)(7)(8)(9).…”
Section: Strength Evaluationmentioning
confidence: 99%