2018
DOI: 10.22219/kinetik.v4i1.719
|View full text |Cite
|
Sign up to set email alerts
|

Keystroke Dynamic Authentication Using Combined MHR (Mean of Horner’s Rules) and Standard Deviation

Abstract: Keystroke Dynamic Authentication used a behavior to authenticate the user and one of biometric authentication. The behavior used a typing speed a character on the keyboard and every user had a unique behavior in typing. To improve classification between user and attacker of Keystroke Dynamic Authentication in this research, we proposed a combination of MHR (Mean of Horner’s Rules) and standard deviation. The results of this research showed that our proposed method gave a high accuracy (93.872%) than the previo… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
5

Citation Types

0
11
0

Year Published

2019
2019
2020
2020

Publication Types

Select...
1
1

Relationship

1
1

Authors

Journals

citations
Cited by 2 publications
(11 citation statements)
references
References 13 publications
(41 reference statements)
0
11
0
Order By: Relevance
“…At present, passwords are one of the popular authentication methods [3][4][5]. Usually, the contents of the password used by the user contain a variety of information they have (or what they know), such as full name, date of birth to the name of his parents [6,7]. Passwords are a simple authentication method that is very easy to implement.…”
Section: Introductionmentioning
confidence: 99%
See 4 more Smart Citations
“…At present, passwords are one of the popular authentication methods [3][4][5]. Usually, the contents of the password used by the user contain a variety of information they have (or what they know), such as full name, date of birth to the name of his parents [6,7]. Passwords are a simple authentication method that is very easy to implement.…”
Section: Introductionmentioning
confidence: 99%
“…Keystroke Dynamic Authentication (KDA) is one of the right solutions in several previous problems. KDA is an authentication technique that utilizes the habit of typing someone as a login parameter from the user of a system [6,11,12]. The purpose of KDA is to increase the security of using passwords that have been widely used and handle various account security issues that are often broken into by irresponsible TELKOMNIKA Telecommun Comput El Control  Combined scaled manhattan distance and mean of horner's rules… (Didih Rizki Chandranegara) 771 users (hackers or attackers) [3,6].…”
Section: Introductionmentioning
confidence: 99%
See 3 more Smart Citations