A method of automatic user authentication by fulltime monitoring of keystroke timings

作者: Masanori Nakakuni , Hiroshi Dozono , Yoshiaki Kasahara , Eisuke Ito

DOI:

关键词: World Wide WebKeystroke loggingThesaurus (information retrieval)Computer scienceUser authentication

摘要:

参考文章(7)
James A. Mahaffey, James D. Cannady Jr., Brandon Craig Rhodes, Multiple Self-Organizing Maps for Intrusion Detection ,(2000)
Oleg Kolesnikov, Wenke Lee, Advanced Polymorphic Worms: Evading IDS by Blending in with Normal Traffic Georgia Institute of Technology. ,(2005)
Thomas Groß, Security analysis of the SAML single sign-on browser/artifact profile annual computer security applications conference. pp. 298- 307 ,(2003) , 10.1109/CSAC.2003.1254334
Teuvo Kohonen, Self-Organizing Maps ,(1995)
Kyunghee Lee, Hyeran Byun, A new face authentication system for memory-constrained devices IEEE Transactions on Consumer Electronics. ,vol. 49, pp. 1214- 1222 ,(2003) , 10.1109/TCE.2003.1261219
Emiliano Acosta, Luis Torres, Alberto Albiol, Edward Delp, An automatic face detection and recognition system for video indexing applications IEEE International Conference on Acoustics Speech and Signal Processing. ,vol. 4, pp. 3644- 3647 ,(2002) , 10.1109/ICASSP.2002.5745445
Qian Tao, Raymond N. J. Veldhuis, Biometric Authentication for a Mobile Personal Device international conference on mobile and ubiquitous systems: networking and services. pp. 1- 3 ,(2006) , 10.1109/MOBIQ.2006.340409