Adversary models for mobile device authentication
R Mayrhofer, S Sigg - ACM Computing Surveys (CSUR), 2021 - dl.acm.org
Mobile device authentication has been a highly active research topic for over 10 years, with
a vast range of methods proposed and analyzed. In related areas, such as secure channel …
a vast range of methods proposed and analyzed. In related areas, such as secure channel …
Keystroke biometric systems for user authentication
Keystroke biometrics (KB) authentication systems are a less popular form of access control,
although they are gaining popularity. In recent years, keystroke biometric authentication has …
although they are gaining popularity. In recent years, keystroke biometric authentication has …
Privacy and biometrics for smart healthcare systems: attacks, and techniques
A Wells, AB Usman - Information Security Journal: A Global …, 2024 - Taylor & Francis
Biometric technology has various applications in smart healthcare systems, including patient
authentication, health monitoring, telemedicine, clinical decision support, and personalized …
authentication, health monitoring, telemedicine, clinical decision support, and personalized …
Network Detection of Interactive {SSH} Impostors Using Deep Learning
Impostors who have stolen a user's SSH login credentials can inflict significant harm to the
systems to which the user has remote access. We consider the problem of identifying such …
systems to which the user has remote access. We consider the problem of identifying such …
[HTML][HTML] Towards liveness detection in keystroke dynamics: Revealing synthetic forgeries
N González, EP Calot, JS Ierache… - Systems and Soft …, 2022 - Elsevier
While the accuracy of keystroke dynamics verification systems has traditionally been
evaluated using a zero-effort attack model, the current trend is to recognize that such an …
evaluated using a zero-effort attack model, the current trend is to recognize that such an …
On the shape of timings distributions in free-text keystroke dynamics profiles
Keystroke dynamics is a soft biometric trait. Although the shape of the timing distributions in
keystroke dynamics profiles is a central element for the accurate modeling of the behavioral …
keystroke dynamics profiles is a central element for the accurate modeling of the behavioral …
Keystroke biometric user verification using Hidden Markov Model
Biometric systems such as fingerprint, iris, DNA became popular methods in user
authentication. Compared to these biometric systems, keystroke biometric authentication …
authentication. Compared to these biometric systems, keystroke biometric authentication …
SWIPEGAN: swi** data augmentation using generative adversarial networks for smartphone user authentication
Behavioral biometric-based smartphone user authentication schemes based on touch/swipe
have shown to provide the desired usability. However, their accuracy is not yet considered …
have shown to provide the desired usability. However, their accuracy is not yet considered …
Becaptcha-type: Biometric keystroke data generation for improved bot detection
This work proposes a data driven learning model for the synthesis of keystroke biometric
data. The proposed method is compared with two statistical approaches based on Universal …
data. The proposed method is compared with two statistical approaches based on Universal …
[HTML][HTML] Ksdsld—a tool for keystroke dynamics synthesis & liveness detection
N González - Software Impacts, 2023 - Elsevier
Keystroke dynamics is a behavioral biometrics modality that employs the characteristic
ty** patterns of users to verify their identity, generally as a part of a multifactor …
ty** patterns of users to verify their identity, generally as a part of a multifactor …