2011 International Conference on User Science and Engineering (I-USEr ) 2011
DOI: 10.1109/iuser.2011.6150566
|View full text |Cite
|
Sign up to set email alerts
|

Mouse movement behavioral biometric systems

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
8
0

Year Published

2017
2017
2024
2024

Publication Types

Select...
5
3

Relationship

0
8

Authors

Journals

citations
Cited by 9 publications
(8 citation statements)
references
References 6 publications
0
8
0
Order By: Relevance
“…Different promising approaches to reduce the burden of explicit authentication have been explored. Transparent biometrics can verify the user's identity unobtrusively [28,46,50] using traits like gait [39], mouth motions [52], heartbeat [56], breathing acoustics [4], voice [42], mouse movement [15], and keystroke dynamics [29]. Risk estimation can be used to dynamically adjust the security settings to apply as much security as needed but as little as possible [19,27].…”
Section: Introductionmentioning
confidence: 99%
“…Different promising approaches to reduce the burden of explicit authentication have been explored. Transparent biometrics can verify the user's identity unobtrusively [28,46,50] using traits like gait [39], mouth motions [52], heartbeat [56], breathing acoustics [4], voice [42], mouse movement [15], and keystroke dynamics [29]. Risk estimation can be used to dynamically adjust the security settings to apply as much security as needed but as little as possible [19,27].…”
Section: Introductionmentioning
confidence: 99%
“…Various research approaches have been introduced in the existing literature to explore feasibility in continuous authentication throughout the user login session and the non-intrusive authentication process to analyze frequent user interaction with the system. Recent trends in the existing literature have shown that user identities can be validated through multiple Behaviometrics, such as keystroke dynamics, CPU and RAM usage [39], mouse movements [40], accelerometers [41] fingerprints [42], and browsing behavior [43]. A detailed description of such an authentication process based on Behaviometrics can be found in the existing literature [44][45][46].…”
Section: ) Behaviometrics Authenticationmentioning
confidence: 99%
“…Most of the existing solutions are not focused on determining that most wearable devices do not provide a suitable interface for password-based authentication [23]- [26]. • Most studies have not focused on the practical implementation of frictionless authentication techniques in web-based applications [36]- [39].…”
Section: Problem Descriptionmentioning
confidence: 99%
“…As we discussed earlier, different nondeterministic source methods will produce a true random number. It is possible to regard the mouse system as a random source [24]. There are two dimensions of the operation of a mouse unit on the screen, the X-axis and Y-axis corresponding to the coordinates of the mouse cursor on a surface at a given point.…”
Section: Mouse Movementmentioning
confidence: 99%