Continuous authentication using biometrics: An advanced review

G Dahia, L Jesus… - … Reviews: Data Mining …, 2020 - Wiley Online Library
The shortcomings of conventional access control systems for high‐security environments
have led to the concert of continuous authentication. Contrary to traditional verification, in …

A survey on adaptive authentication

P Arias-Cabarcos, C Krupitzer, C Becker - ACM Computing Surveys …, 2019 - dl.acm.org
Adaptive Authentication allows a system to dynamically select the best mechanism (s) for
authenticating a user depending on contextual factors, such as location, proximity to …

A study on continuous authentication using a combination of keystroke and mouse biometrics

S Mondal, P Bours - Neurocomputing, 2017 - Elsevier
In this paper we focus on a context independent continuous authentication system that
reacts on every separate action performed by a user. We contribute with a robust dynamic …

Keystroke biometric systems for user authentication

ML Ali, JV Monaco, CC Tappert, M Qiu - Journal of Signal Processing …, 2017 - Springer
Keystroke biometrics (KB) authentication systems are a less popular form of access control,
although they are gaining popularity. In recent years, keystroke biometric authentication has …

[HTML][HTML] Continuous authentication by free-text keystroke based on CNN and RNN

X Lu, S Zhang, P Hui, P Lio - Computers & Security, 2020 - Elsevier
Personal keystroke modes are difficult to imitate and can therefore be used for identity
authentication. The keystroke habits of a person can be learned according to the keystroke …

Intrusion detection using mouse dynamics

M Antal, E Egyed‐Zsigmond - IET Biometrics, 2019 - Wiley Online Library
Compared to other behavioural biometrics, mouse dynamics is a less explored area.
General purpose data sets containing unrestricted mouse usage data are usually not …

Evaluating behavioral biometrics for continuous authentication: Challenges and metrics

S Eberz, KB Rasmussen, V Lenders… - … of the 2017 ACM on Asia …, 2017 - dl.acm.org
In recent years, behavioral biometrics have become a popular approach to support
continuous authentication systems. Most generally, a continuous authentication system can …

A searchable encryption scheme with biometric authentication and authorization for cloud environments

MI Mihailescu, SL Nita - Cryptography, 2022 - mdpi.com
Cloud computing offers the possibility of providing suitable access within a network for a set
of resources. Many users use different services for outsourcing their data within the cloud …

CABA: Continuous authentication based on BioAura

A Mosenia, S Sur-Kolay… - IEEE Transactions on …, 2016 - ieeexplore.ieee.org
Most computer systems authenticate users only once at the time of initial login, which can
lead to security concerns. Continuous authentication has been explored as an approach for …

A systematic literature review on latest keystroke dynamics based models

S Roy, J Pradhan, A Kumar, DRD Adhikary… - IEEE …, 2022 - ieeexplore.ieee.org
The purpose of this study is to conduct a comprehensive evaluation and analysis of the most
recent studies on the implications of keystroke dynamics (KD) patterns in user …