Filters








226 Hits in 3.4 sec

Password hardening based on keystroke dynamics

Fabian Monrose, Michael K. Reiter, Susanne Wetzel
1999 Proceedings of the 6th ACM conference on Computer and communications security - CCS '99  
., durations of keystrokes and latencies between keystrokes) are combined with the user's password to generate a hardened password that is convincingly more secure than conventional passwords alone.  ...  In addition, our scheme automatically adapts to gradual changes in a user's typing patterns while maintaining the same hardened password across multiple logins, for use in file encryption or other applications  ...  Phil MacKenzie and the anonymous referees for the Sixth ACM Conference on Computer and Communications Security provided helpful comments that improved the presentation of an earlier version of this paper  ... 
doi:10.1145/319709.319720 dblp:conf/ccs/MonroseRW99 fatcat:wsdd2es2tfdzbc5agawiegxgra

Password hardening based on keystroke dynamics

Fabian Monrose, Michael K. Reiter, Susanne Wetzel
2002 International Journal of Information Security  
., durations of keystrokes and latencies between keystrokes) are combined with the user's password to generate a hardened password that is convincingly more secure than conventional passwords alone.  ...  In addition, our scheme automatically adapts to gradual changes in a user's typing patterns while maintaining the same hardened password across multiple logins, for use in file encryption or other applications  ...  Phil MacKenzie and the anonymous referees for the Sixth ACM Conference on Computer and Communications Security provided helpful comments that improved the presentation of an earlier version of this paper  ... 
doi:10.1007/s102070100006 fatcat:7b3wnbavxfazzgilgg7ldb3wei

Evaluating the Reliability of Credential Hardening through Keystroke Dynamics

Nick Bartlow, Bojan Cukic
2006 Proceedings - International Symposium on Software Reliability Engineering  
Our research extends previous work on keystroke dynamics by incorporating shift-key patterns.  ...  Keystroke dynamics provide the ability to combine the ease of use of username / password schemes with the increased trustworthiness associated with biometrics.  ...  In 2001, Monrose, Reiter, and Wetzel formally proposed the use of keystroke dynamics as a password hardening scheme with perhaps the smallest input requirement yet (an eight character password) [16] .  ... 
doi:10.1109/issre.2006.25 dblp:conf/issre/BartlowC06 fatcat:reuysb62ofdpto2f5y7yzkeb6u

Typing patterns: a key to user identification

A. Peacock, Xian Ke, M. Wilkerson
2004 IEEE Security and Privacy  
Password hardening A hardened password based on typing patterns can be used to create long-term, cryptographically stronger secrets for login, encryption, and more.  ...  A Web-based authentication solution incorporating keystroke dynamics could replace standard, form-based logins with one that can collect keystrokes.  ... 
doi:10.1109/msp.2004.89 fatcat:3s2g6ccicbav5mqeftjo35vlx4

Keystroke Dynamic Authentication in Mobile Cloud Computing

Mahnoush Babaeizadeh, Majid Bakhtiari, Mohd Aizaini Maarof
2014 International Journal of Computer Applications  
This work presents a method of authentication which able to identify users based on Keystroke Dynamic Authentication (KDA).  ...  On the other hand, if unauthorized person knows the username and password of legal user can not gain access rights because of difference between their keystroke duration.  ...  Behavioral biometrics is based on the user's behavior and authentication may occur perfectly such as signature, keystroke dynamics [43] and voice.  ... 
doi:10.5120/15541-4274 fatcat:uijfs5m2mzh5fa2pqtq6ijlulm

User authentication using keystroke dynamics for cellular phones

P. Campisi, E. Maiorana, M. Lo Bosco, A. Neri
2009 IET Signal Processing  
system including, as basic security, a password-based protocol eventually hardened by keystroke analysis.  ...  In the proposed method, users are authenticated using keystroke dynamics acquired when typing fixed alphabetic strings on a mobile phone keypad.  ...  In fact, we assume that the keystroke-based authentication is used as a password hardening mechanism.  ... 
doi:10.1049/iet-spr.2008.0171 fatcat:tsmerorvgbbwxh2xlmoysnzz5u

Utilizing Keystroke Dynamics as an Additional Security Measure to Password Security in Computer Web-based Applications - A Case Study of UEW

Osei Boakye, Yaw Marfo
2016 International Journal of Computer Applications  
This study concludes that the use of keystrokes dynamics in augmenting password security in computer web-based applications should be embraced. General Terms  ...  Keystroke Dynamics is one of the well-known and economical behavioral biometric developments that attempt to recognize the genuineness of a client when the client invokes his keystrokes from a computer  ...  Their approach was mainly to generate password for clients based on their typing 36behavior to be used in other systems and the keystroke dynamic metric used was continuous keystroke technique [3] .  ... 
doi:10.5120/ijca2016911402 fatcat:xiswkfybpjdmvaf3n3grhqdjki

The Analysis of Emotions over Keystroke Dynamics

Su-xia CUI, Odinaka EKWONNAH, Yong-hui WANG
2018 DEStech Transactions on Computer Science and Engineering  
This paper investigates the effectiveness of the keystroke dynamics with the influence of emotion.  ...  Password as a form of authentication based on "what you know" has become widely used in computer devices and networks because of its ease of use and limited processing requirements by the application.  ...  The use of keystrokes pattern has been considered as a form of password hardening in applications.  ... 
doi:10.12783/dtcse/iece2018/26620 fatcat:p5tlzhucc5hi7mbavo5knfqy5u

A k-Nearest Neighbor Approach for User Authentication through Biometric Keystroke Dynamics

J. Hu, D. Gingrich, A. Sentosa
2008 2008 IEEE International Conference on Communications  
Keystroke dynamics exhibit people's behavioral features which are similar to hand signatures.  ...  In this paper, a k-nearest neighbor approach has been proposed to classify users' keystroke dynamics profiles.  ...  They proposed an algorithm that combined the password with the keystroke latency and duration to generate the hardened password. This hardened password became the final outcome for authentication.  ... 
doi:10.1109/icc.2008.301 dblp:conf/icc/HuGS08 fatcat:4kyhi2p5nzfx5pftrhqzpu7rqe

Enhancing Login Security Through the Use of Keystroke Input Dynamics [chapter]

Kenneth Revett, Sérgio Tenreiro de Magalhães, Henrique M. D. Santos
2005 Lecture Notes in Computer Science  
We provide evidence that completely software based systems based on keystroke input dynamics can be as effective as expensive and cumbersome hardware based systems.  ...  In this paper, we propose an extension to a keystroke dynamics based security system.  ...  Our system is based on what has now become known as "keystroke dynamics" with the addition of keyboard partitioning [1, 2] .  ... 
doi:10.1007/11608288_88 fatcat:6jkfvblz5zfiflibe52mes3njm

How to improve performance of Neural Network in the hardened password mechanism

Narainsamy Pavaday, Insah Bhurtah, Dr. K.M.Sunjiv Soyjaudah
2011 GSTF International Journal on Computing  
Due to weaknesses of the de facto password scheme, inclusion of its inherent keystroke rhythms, have been proposed and systems that implement such security measures are also on the market.  ...  This correspondence investigates possibility and ways for optimising performance of hardened password mechanism using the widely accepted Neural Network classifier.  ...  The current paper started with an introduction to authentication with a focus on passwords schemes and the enhanced variant known as keystroke dynamics.  ... 
doi:10.5176/2010-2283_1.2.42 fatcat:ipd45p4sdjdpzgeaji57iwifoe

Keystroke Dynamics Overview [chapter]

Romain Giot, Mohamad El-Abed, Christophe Rosenberger
2011 Biometrics  
Satisfaction (on the left) and security (on the right) assessment of a keystroke dynamics based system.  ...  Identification based on keystroke dynamics has not been much experimented in the literature.  ...  Keystroke Dynamics Overview, Biometrics, Dr.  ... 
doi:10.5772/17064 fatcat:wpaw4i6s2vae3fbceqvkzw2kly

Improving Accuracy, Applicability and Usability of Keystroke Biometrics on Mobile Touchscreen Devices

Daniel Buschek, Alexander De Luca, Florian Alt
2015 Proceedings of the 33rd Annual ACM Conference on Human Factors in Computing Systems - CHI '15  
Based on 20.160 password entries from a study with 28 participants over two weeks, we show that including spatial touch features reduces implicit authentication equal error rates (EER) by 26.4 -36.8% relative  ...  In particular, verifying users based on typing behaviour has been widely studied with physical keyboards. On mobile touchscreens, the same concepts have been applied with little adaptations so far.  ...  [47] combined linguistic analysis with keystroke dynamics on mobile devices. The keystroke-based part of their system used key-hold times and achieved 20.8% EER.  ... 
doi:10.1145/2702123.2702252 dblp:conf/chi/BuschekLA15 fatcat:53mu75oxmrhjzchcpbb6sqkin4

Detecting Password File Theft using Predefined Time-Delays between Certain Password Characters

Khaled W. Mahmoud, Khalid Mansour, Alaa Makableh
2017 Journal of Telecommunications and Information Technology  
The proposed mechanism uses delay between consecutive keystrokes of the password characters.  ...  password file.  ...  It should be clear that this approach of password hardening is different from password hardening based on keystroke dynamics.  ... 
doi:10.26636/jtit.2017.112517 fatcat:jergzuj5o5bapmhaq2ppdkpohy

Capturing Cognitive Fingerprints from Keystroke Dynamics

J. Morris Chang, Chi-Chen Fang, Kuan-Hsing Ho, Norene Kelly, Pei-Yuan Wu, Yixiao Ding, Chris Chu, Stephen Gilbert, Amed E. Kamal, Sun-Yuan Kung
2013 IT Professional Magazine  
In the current keystroke-authentication commercial market, some products combine the timing information of the password with password-based access control to generate a hardened password. 4 Here, we  ...  In the future, we'll study keystroke dynamics on different platforms.  ... 
doi:10.1109/mitp.2013.52 fatcat:csndkdleobfnfp2tsmyuh6llfy
« Previous Showing results 1 — 15 out of 226 results