Works matching DE "KEYSTROKE timing authentication"
Results: 92
An Efficient Biometric Based Remote User Authentication Technique for Multi-server Environment.
- Published in:
- Wireless Personal Communications, 2017, v. 97, n. 3, p. 4729, doi. 10.1007/s11277-017-4748-4
- By:
- Publication type:
- Article
Keystrokes Inference Attack on Android: A Comparative Evaluation of Sensors and Their Fusion.
- Published in:
- Journal of ICT Research & Applications, 2013, v. 7, n. 2, p. 117, doi. 10.5614/itbj.ict.res.appl.2013.7.2.2
- By:
- Publication type:
- Article
Augmenting LZ-77 with authentication and integrity assurance capabilities.
- Published in:
- Concurrency & Computation: Practice & Experience, 2004, v. 16, n. 11, p. 1063, doi. 10.1002/cpe.804
- By:
- Publication type:
- Article
Identification and authentication of integrated circuits.
- Published in:
- Concurrency & Computation: Practice & Experience, 2004, v. 16, n. 11, p. 1077, doi. 10.1002/cpe.805
- By:
- Publication type:
- Article
Keystroke Dynamics User Authentication Based on Gaussian Mixture Model and Deep Belief Nets.
- Published in:
- ISRN Signal Processing, 2013, p. 1, doi. 10.1155/2013/565183
- By:
- Publication type:
- Article
A LONGITUDINAL STUDY INVESTIGATING PRESSURE-RELATED CHARACTERISTICS FOR KEYSTROKE ANALYSIS.
- Published in:
- Journal of Information System Security, 2015, v. 11, n. 3, p. 171
- By:
- Publication type:
- Article
EDITORIAL.
- Published in:
- Journal of Information System Security, 2015, v. 11, n. 3, p. 169
- By:
- Publication type:
- Article
Watch what you type: The role of visual feedback from the screen and hands in skilled typewriting.
- Published in:
- Attention, Perception & Psychophysics, 2015, v. 77, n. 1, p. 282, doi. 10.3758/s13414-014-0756-6
- By:
- Publication type:
- Article
Maps as Passwords.
- Published in:
- Ekscentar, 2010, n. 13, p. 15
- Publication type:
- Article
Keystroke Saving in a Language with Highly Transparent Orthography.
- Published in:
- Journal of Computing & Information Technology, 2010, v. 18, n. 3, p. 275, doi. 10.2498/cit.1001737
- By:
- Publication type:
- Article
A Design, Tests and Considerations for Improving Keystroke and Mouse Loggers.
- Published in:
- Interacting with Computers, 2013, v. 25, n. 3, p. 242, doi. 10.1093/iwc/iws014
- By:
- Publication type:
- Article
The reliability of user authentication through keystroke dynamics.
- Published in:
- Statistica Neerlandica, 2009, v. 63, n. 4, p. 432, doi. 10.1111/j.1467-9574.2009.00434.x
- By:
- Publication type:
- Article
The rôle of linear logic in coalgebraical approach of computing.
- Published in:
- Journal of Information & Organizational Sciences, 2011, v. 35, n. 2, p. 197
- By:
- Publication type:
- Article
Effects of Task Complexity on L2 Writing Processes and Linguistic Complexity: A Keystroke Logging Study.
- Published in:
- English Teaching, 2017, v. 72, n. 4, p. 179, doi. 10.15858/engtea.72.4.201712.179
- By:
- Publication type:
- Article
Sequence Alignment with Dynamic Divisor Generation for Keystroke Dynamics Based User Authentication.
- Published in:
- Journal of Sensors, 2015, v. 2015, p. 1, doi. 10.1155/2015/935986
- By:
- Publication type:
- Article
Keystroke dynamics in the pre-touchscreen era.
- Published in:
- Frontiers in Human Neuroscience, 2013, v. 7, p. 1, doi. 10.3389/fnhum.2013.00835
- By:
- Publication type:
- Article
Creating a Culture of Enterprise Cybersecurity.
- Published in:
- International Journal of Business Anthropology, 2011, v. 2, n. 2, p. 36
- By:
- Publication type:
- Article
Fingerprint Template Protection Using One-Time Fuzzy Vault.
- Published in:
- KSII Transactions on Internet & Information Systems, 2011, v. 5, n. 11, p. 2221, doi. 10.3837/tiis.2011.11.020
- By:
- Publication type:
- Article
Enhanced Security Scheme to Support Secure and Fast ASN-anchored Mobility in Mobile WiMAX.
- Published in:
- KSII Transactions on Internet & Information Systems, 2011, v. 5, n. 11, p. 2204, doi. 10.3837/tiis.2011.11.019
- By:
- Publication type:
- Article
Practical Password-Authenticated Three-Party Key Exchange.
- Published in:
- KSII Transactions on Internet & Information Systems, 2008, v. 2, n. 6, p. 312, doi. 10.3837/tiis.2008.06.003
- By:
- Publication type:
- Article
A Secured and Reliable Biometric User Authentication Using Keystroke Template Method.
- Published in:
- Journal of Applied Security Research, 2015, v. 10, n. 3, p. 375, doi. 10.1080/19361610.2015.1038767
- By:
- Publication type:
- Article
The influence of emotion on keyboard typing: an experimental study using visual stimuli.
- Published in:
- BioMedical Engineering OnLine, 2014, v. 13, n. 1, p. 1, doi. 10.1186/1475-925X-13-81
- By:
- Publication type:
- Article
Will User Authentication Using Keystroke Dynamics Biometrics Be Interfered by Emotions? - NCTU-15 Affective Keyboard Typing Dataset for Hypothesis Testing.
- Published in:
- Gate to Computer Science & Research, 2015, v. 2, p. 71, doi. 10.15579/gcsr.vol2.ch5
- By:
- Publication type:
- Article
Keystroke Dynamics Advances for Mobile Devices Using Deep Neural Network.
- Published in:
- Gate to Computer Science & Research, 2015, v. 2, p. 59, doi. 10.15579/gcsr.vol2.ch4
- By:
- Publication type:
- Article
Continuous Authentication with Keystroke Dynamics.
- Published in:
- Gate to Computer Science & Research, 2015, v. 2, p. 41, doi. 10.15579/gcsr.vol2.ch3
- By:
- Publication type:
- Article
Keystroke Dynamics User Authentication Using Advanced Machine Learning Methods.
- Published in:
- Gate to Computer Science & Research, 2015, v. 2, p. 23, doi. 10.15579/gcsr.vol2.ch2
- By:
- Publication type:
- Article
A Survey on Keystroke Dynamics Biometrics: Approaches, Advances, and Evaluations.
- Published in:
- Gate to Computer Science & Research, 2015, v. 2, p. 1, doi. 10.15579/gcsr.vol2.ch1
- By:
- Publication type:
- Article
Preface.
- Published in:
- Gate to Computer Science & Research, 2015, v. 2, p. iii
- By:
- Publication type:
- Article
Dynamic Free Text Keystroke Biometrics System for Simultaneous Authentication and Adaptation to User's Typing Pattern.
- Published in:
- Journal of Management & Engineering Integration, 2013, v. 6, n. 2, p. 86
- By:
- Publication type:
- Article
Authenticating mobile phone users using keystroke analysis.
- Published in:
- International Journal of Information Security, 2007, v. 6, n. 1, p. 1, doi. 10.1007/s10207-006-0006-6
- By:
- Publication type:
- Article
Hierarchical time-based information release.
- Published in:
- International Journal of Information Security, 2006, v. 5, n. 2, p. 92, doi. 10.1007/s10207-006-0084-5
- By:
- Publication type:
- Article
Analysing a stream authentication protocol using model checking.
- Published in:
- International Journal of Information Security, 2004, v. 3, n. 1, p. 2, doi. 10.1007/s10207-004-0040-1
- By:
- Publication type:
- Article
Authentication Method through Keystrokes Measurement of Mobile users in Cloud Environment.
- Published in:
- International Journal of Advances in Soft Computing & Its Applications, 2014, v. 6, n. 3, p. 94
- By:
- Publication type:
- Article
Halt! Who Goes There?
- Published in:
- Government Technology, 2006, v. 19, n. 7, p. 36
- By:
- Publication type:
- Article
TKCA: a timely keystroke-based continuous user authentication with short keystroke sequence in uncontrolled settings.
- Published in:
- Cybersecurity (2523-3246), 2021, v. 4, n. 1, p. 1, doi. 10.1186/s42400-021-00075-9
- By:
- Publication type:
- Article
The Security Challenges of The Rhythmprint Authentication.
- Published in:
- International Journal of Electrical & Computer Engineering (2088-8708), 2018, v. 8, n. 3, p. 1281, doi. 10.11591/ijece.v8i3.pp1281-1287
- By:
- Publication type:
- Article
Revision and cohesion in translation.
- Published in:
- Translation & Interpreting Studies: The Journal of the American Translation & Interpreting Studies Association, 2014, v. 9, n. 1, p. 70, doi. 10.1075/tis.9.1.04joh
- By:
- Publication type:
- Article
On Neural Networks for Biometric Authentication Based on Keystroke Dynamics.
- Published in:
- Sensors & Materials, 2018, v. 30, n. 3,Part 1, p. 385, doi. 10.18494/SAM.2018.1757
- By:
- Publication type:
- Article
Keystroke-level analysis to estimate time to process pages in online learning environments.
- Published in:
- Interactive Learning Environments, 2018, v. 26, n. 4, p. 476, doi. 10.1080/10494820.2017.1341941
- By:
- Publication type:
- Article
Correlation Keystroke Verification Scheme for User Access Control in Cloud Computing Environment.
- Published in:
- Computer Journal, 2011, v. 54, n. 10, p. 1632
- By:
- Publication type:
- Article
Provably Secure Password-Based Three-Party Key Exchange With Optimal Message Steps.
- Published in:
- Computer Journal, 2009, v. 52, n. 6, p. 646, doi. 10.1093/comjnl/bxn070
- By:
- Publication type:
- Article
Robust and Simple Authentication Protocol.
- Published in:
- Computer Journal, 2003, v. 46, n. 2, p. 193, doi. 10.1093/comjnl/46.2.193
- By:
- Publication type:
- Article
L2 Writing in Test and Non-test Situations: Process and Product.
- Published in:
- Journal of Writing Research, 2014, v. 6, n. 3, p. 233
- By:
- Publication type:
- Article
Mitigating CAPTCHA Relay Attacks Using Multiple Challenge-Response Mechanism.
- Published in:
- Computing & Information Systems, 2010, v. 14, n. 3, p. 36
- By:
- Publication type:
- Article
Editorial.
- Published in:
- Journal of New Business Ideas & Trends, 2018, v. 16, n. 2, p. ii
- By:
- Publication type:
- Article
Biometric Identification and Authentication in Computers: Keystroke Dynamics.
- Published in:
- Journal of New Business Ideas & Trends, 2018, v. 16, n. 2, p. 24
- By:
- Publication type:
- Article
Keystroke Analysis: Reflections on Procedures and Measures.
- Published in:
- Written Communication, 2012, v. 29, n. 3, p. 246, doi. 10.1177/0741088312451108
- By:
- Publication type:
- Article
Normalizing variations in feature vector structure in keystroke dynamics authentication systems.
- Published in:
- Software Quality Journal, 2016, v. 24, n. 1, p. 137, doi. 10.1007/s11219-014-9263-1
- By:
- Publication type:
- Article
Anomaly detection through keystroke and tap dynamics implemented via machine learning algorithms.
- Published in:
- Turkish Journal of Electrical Engineering & Computer Sciences, 2018, v. 26, n. 4, p. 1698, doi. 10.3906/elk-1711-410
- By:
- Publication type:
- Article
Effects of input methods on inter-key press intervals during continuous typing.
- Published in:
- Ergonomics, 2009, v. 52, n. 9, p. 1153, doi. 10.1080/00140130902919121
- By:
- Publication type:
- Article