2019
DOI: 10.1016/j.cose.2019.02.002
|View full text |Cite
|
Sign up to set email alerts
|

Double serial adaptation mechanism for keystroke dynamics authentication based on a single password

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
11
0

Year Published

2019
2019
2022
2022

Publication Types

Select...
4
3

Relationship

1
6

Authors

Journals

citations
Cited by 28 publications
(11 citation statements)
references
References 48 publications
0
11
0
Order By: Relevance
“…Biometrics is one of the safest and most reliable ways of authentication as it is the characteristic of the user only. The most popular biometric methods used are finger scan [4], [5], retina scan [6], face scan [7], [8], keystroke dynamics [9], [10], etc. Finger scan is the most popular biometric being used in mobile phones.…”
Section: Introductionmentioning
confidence: 99%
“…Biometrics is one of the safest and most reliable ways of authentication as it is the characteristic of the user only. The most popular biometric methods used are finger scan [4], [5], retina scan [6], face scan [7], [8], keystroke dynamics [9], [10], etc. Finger scan is the most popular biometric being used in mobile phones.…”
Section: Introductionmentioning
confidence: 99%
“…2. The short texts datasets are predominantly based on passwords thereby mostly appropriate for studying the static authentication [9]. On the other hand, the long texts datasets are further divided into two categories i.e., fixed text and free text.…”
Section: Literature Reviewmentioning
confidence: 99%
“…The current authentication mechanisms, which have been used in most applications, vary from using a single factor, for example, a password or user ID, to using a multi-factor authentication, such as a smart card or biological characteristic. These traditional methods are not effective in providing appropriate protection and can cause various issues and damage, for example, recently passwords have been easily and frequently hacked [88]. Multi-factor authentication relies on centralisation or trusting third-party services, which, as we discussed previously, have high security risks.…”
Section: Authenticationmentioning
confidence: 99%