Proceedings of the 6th ACM Symposium on Information, Computer and Communications Security 2011
DOI: 10.1145/1966913.1966983
|View full text |Cite
|
Sign up to set email alerts
|

On mouse dynamics as a behavioral biometric for authentication

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
75
0

Year Published

2011
2011
2023
2023

Publication Types

Select...
6
3
1

Relationship

0
10

Authors

Journals

citations
Cited by 129 publications
(75 citation statements)
references
References 12 publications
0
75
0
Order By: Relevance
“…They could thus be used in conjunction, in an attempt to develop a more precise approach. Other approaches have been analyzed by [18], who review existing authentication approaches based on mouse dynamics and shed light on some important limitations regarding how the effectiveness of these approaches has been evaluated in the past. The authors also present the results of several experiments conducted by them to illustrate their observations and suggest guidelines for evaluating future authentication approaches based on mouse dynamics.…”
Section: Related Workmentioning
confidence: 99%
“…They could thus be used in conjunction, in an attempt to develop a more precise approach. Other approaches have been analyzed by [18], who review existing authentication approaches based on mouse dynamics and shed light on some important limitations regarding how the effectiveness of these approaches has been evaluated in the past. The authors also present the results of several experiments conducted by them to illustrate their observations and suggest guidelines for evaluating future authentication approaches based on mouse dynamics.…”
Section: Related Workmentioning
confidence: 99%
“…Asha & Chellappan [4] recommend merging behavioral and physiological biometrics by using a physical fingerprint recognition combined with mouse dynamics (both biometrics authentication achieved using a mouse with an inbuilt fingerprint scanner). Many practical studies argue that the time required for data collection of mouse dynamics is very long [7]; this would open the door for suspicious student activities. Additionally, the system ignores the other potential problems including the secure environment around the student (e.g.…”
Section: Related Workmentioning
confidence: 99%
“…Various challenges have been addressed for verifying mouse actions. As pointed out by (Jorgensen & Yu, 2011), the amount of mouse data and time required for user authentication could affect the practicality of mouse dynamics especially for continuous verification. (Shen, Cai, Guan, Du, & Maxion, 2013) There are two categories for handwritten signature authentication, offline and online.…”
Section: ) Hand Gesturesmentioning
confidence: 99%