Continuous authentication using biometrics: An advanced review
G Dahia, L Jesus… - … Reviews: Data Mining …, 2020 - Wiley Online Library
The shortcomings of conventional access control systems for high‐security environments
have led to the concert of continuous authentication. Contrary to traditional verification, in …
have led to the concert of continuous authentication. Contrary to traditional verification, in …
A survey on adaptive authentication
Adaptive Authentication allows a system to dynamically select the best mechanism (s) for
authenticating a user depending on contextual factors, such as location, proximity to …
authenticating a user depending on contextual factors, such as location, proximity to …
A study on continuous authentication using a combination of keystroke and mouse biometrics
In this paper we focus on a context independent continuous authentication system that
reacts on every separate action performed by a user. We contribute with a robust dynamic …
reacts on every separate action performed by a user. We contribute with a robust dynamic …
Keystroke biometric systems for user authentication
Keystroke biometrics (KB) authentication systems are a less popular form of access control,
although they are gaining popularity. In recent years, keystroke biometric authentication has …
although they are gaining popularity. In recent years, keystroke biometric authentication has …
[HTML][HTML] Continuous authentication by free-text keystroke based on CNN and RNN
Personal keystroke modes are difficult to imitate and can therefore be used for identity
authentication. The keystroke habits of a person can be learned according to the keystroke …
authentication. The keystroke habits of a person can be learned according to the keystroke …
Intrusion detection using mouse dynamics
Compared to other behavioural biometrics, mouse dynamics is a less explored area.
General purpose data sets containing unrestricted mouse usage data are usually not …
General purpose data sets containing unrestricted mouse usage data are usually not …
Evaluating behavioral biometrics for continuous authentication: Challenges and metrics
In recent years, behavioral biometrics have become a popular approach to support
continuous authentication systems. Most generally, a continuous authentication system can …
continuous authentication systems. Most generally, a continuous authentication system can …
A searchable encryption scheme with biometric authentication and authorization for cloud environments
Cloud computing offers the possibility of providing suitable access within a network for a set
of resources. Many users use different services for outsourcing their data within the cloud …
of resources. Many users use different services for outsourcing their data within the cloud …
CABA: Continuous authentication based on BioAura
Most computer systems authenticate users only once at the time of initial login, which can
lead to security concerns. Continuous authentication has been explored as an approach for …
lead to security concerns. Continuous authentication has been explored as an approach for …
A systematic literature review on latest keystroke dynamics based models
The purpose of this study is to conduct a comprehensive evaluation and analysis of the most
recent studies on the implications of keystroke dynamics (KD) patterns in user …
recent studies on the implications of keystroke dynamics (KD) patterns in user …