2015 International Conference on Communication, Information &Amp; Computing Technology (ICCICT) 2015
DOI: 10.1109/iccict.2015.7045746
|View full text |Cite
|
Sign up to set email alerts
|

Mobile authentication using keystroke dynamics

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
19
0
1

Year Published

2016
2016
2024
2024

Publication Types

Select...
4
2

Relationship

0
6

Authors

Journals

citations
Cited by 13 publications
(20 citation statements)
references
References 18 publications
0
19
0
1
Order By: Relevance
“…The third approach is to recruit a separate pool of subjects specifically for providing the illegitimate samples. Take (Dhage et al, 2015;Gascon et al, 2014;Sen and Muralidharan, 2014) for example, instead of requesting the subjects recruited for providing the legitimate samples, the research team recruited additional subjects for providing the illegitimate samples. In this way, it is more likely to obtain a balanced number of the legitimate and the illegitimate samples.…”
Section: Legitimate and Illegitimate Subject Samplesmentioning
confidence: 99%
See 2 more Smart Citations
“…The third approach is to recruit a separate pool of subjects specifically for providing the illegitimate samples. Take (Dhage et al, 2015;Gascon et al, 2014;Sen and Muralidharan, 2014) for example, instead of requesting the subjects recruited for providing the legitimate samples, the research team recruited additional subjects for providing the illegitimate samples. In this way, it is more likely to obtain a balanced number of the legitimate and the illegitimate samples.…”
Section: Legitimate and Illegitimate Subject Samplesmentioning
confidence: 99%
“…Statistical (ST): There are several statistical techniques that have been used in biometrics research. These techniques include the mean and standard deviation (Tasia et al, 2014;Zheng et al, 2014) and the deviation tolerance (Dhage et al, 2015;Huang et al, 2012). There are a number of advantages associated with these techniques.…”
Section: Support Vector Machine (Svm)mentioning
confidence: 99%
See 1 more Smart Citation
“…A similar approach proposed by Dhage et al used dwell time, fly time, and drift as features. A dataset was collected by asking 15 subjects to type 10 samples of a password consisting of 10 characters using a Sony Xperia M mobile device.…”
Section: Background and Related Workmentioning
confidence: 99%
“…Experiments using characters as well as PIN have been conducted. Starting with EER 6.9% of the study using 6 characters [9], experiment using 6 to 8 characters showed EER of 21.02% [15], using 10 characters showed EER of 0.806% [16], and using 34 characters showed EER of 9.3% [17], respectively. Later, there was a new type of study that extracts pressure and time interval from image instead of keys [6].…”
Section: Related Workmentioning
confidence: 99%