2011
DOI: 10.1093/comjnl/bxr064
|View full text |Cite
|
Sign up to set email alerts
|

Correlation Keystroke Verification Scheme for User Access Control in Cloud Computing Environment

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
22
0

Year Published

2012
2012
2021
2021

Publication Types

Select...
4
3
2

Relationship

0
9

Authors

Journals

citations
Cited by 51 publications
(22 citation statements)
references
References 14 publications
0
22
0
Order By: Relevance
“…Security is a very broad area ranging from access control [16], key generation [17], to intrusion detection [18]. In the future work, we will investigate how to apply the proposed NDTC scheme to the biometrics template protection framework [19][20] to form a strong bio-cryptography system.…”
Section: Discussionmentioning
confidence: 99%
“…Security is a very broad area ranging from access control [16], key generation [17], to intrusion detection [18]. In the future work, we will investigate how to apply the proposed NDTC scheme to the biometrics template protection framework [19][20] to form a strong bio-cryptography system.…”
Section: Discussionmentioning
confidence: 99%
“…Independent authors propose biometric authentication based on fingerprint through an authentication server and a client software [8] or fingerprint features in [9] are not only used for biometric verication but also for cryptographic key generation; in [10] author involves a fingerprint biometric and password to enhance the security level of the remote authentication scheme for mobile device; paper [11] proposes two-factor authentication scheme based on Schnorr digital signature and feature extraction from fingerprint. As a typical behavioral biometrics, some author [12] [13] use keystroke dynamics to obtain a UAC solution. The advantage of using behavioral biometrics such as keystroke dynamics is that it can be collected even without the knowledge of the user.…”
Section: Related Workmentioning
confidence: 99%
“…For example, a worker role may implement the execution of in-house codes, launch hosted executable applications, write files, and store results. The WA storage (WAS) [39] provides four services (BLOB, Table, Queue, Drive) [40] that are secure [41], scalable, and easy to access making storage activities durable in the cloud. The BLOB (binary large object) service is the file system providing storage for large datasets such as images, video, documents.…”
Section: The Structure-adaptive-materials-prediction Compute System Imentioning
confidence: 99%