By Topic

Typing Biometrics User Authentication based on Fuzzy Logic

Sign In

Cookies must be enabled to login.After enabling cookies , please use refresh or reload or ctrl+f5 on the browser for the login options.

The purchase and pricing options are temporarily unavailable. Please try again later.
5 Author(s)

References

Showing 1-14 of 14 Results
  1. S. M. Matyas Jrand J. Stapleton, "A Biometric Standard for Information Management and Security", Computers & Security, vol. 19, pp. 428-441, 2000 [CrossRef] 
  2. D. Polemi, EU Commission Final Report: Biometric Techniques: Review and Evaluation of Biometric Techniques for Identification and Authentication, Including an Appraisal of the areas where they are Most Applicable, 1997
  3. F. Monrose and A.D. Rubin, "Keystroke Dynamics as a Biometric for Authentication", Future Generation Computer Systems, vol. 16, pp. 351-359, 2000 [CrossRef] 
  4. F. Monrose , M. K. Reiter and S. Wetzel, "Password Hardening Based on Keystroke Dynamics", proc. 6th ACM Conference on Computer Security, 1999 [CrossRef] 
  5. W. G. de Ru and J. H. P. Eloff, "Enhanced Password Authentication through Fuzzy Logic", IEEE Expert / Intelligent Systems & Their Applications, vol. 17, pp. 38-45, 1997
  6. J. A. Robinson , V. M. Liang , J. A. Michael and C. L. MacKenzie, "Computer User Verification Login String Keystroke Dynamics", IEEE Trans. Syst., Man, Cybern, vol. 28, pp. 236-241, 1998
  7. D.-T. Lin, "Computer-Access Authentication with Neural Network Based Keystroke Identity Verification", proc. International Conference on Neural Networks, vol. 1, pp. 174-178, 1997
  8. M. S. Obaidat and B. Sadoun, "Verification of Computer User Using Keystroke Dynamics", IEEE Trans. Syst., Man, Cybern., vol. 27, pp. 261-269, 1997
  9. O. Coltell , J. M. Badfa and G. Torresm, "Biometric Identification System Based in Keyboard Filtering", proc. IEE 33rd Annual 1990 International Carnahan Conference on Security Technology, pp. 203-209, 1999
  10. R. Joyce and G. Gupta, "Identity Authentication Based on Keystroke Latencies", Communication of ACM, vol. 33, pp. 168-176, 1990
  11. S. Bleha , C. Slivinsky and B. Hussain, "Computer-Access Security Systems Using Keystroke Dynamics", IEEE Trans. Pattern Anal. Machine Intell., vol. 12, pp. 1217-1222, 1990
  12. S. Haidar , A. Abbas and A. K. Zaidi, "A Multi-Technique Approach for User Identification through Keystroke Dynamics", proc. IEEE International Conference of Systems, Man and Cybernetics, vol. 2, pp. 1336-1341, 2000
  13. F. W. M. H. Wong , A. S. M. Supian , A. F. Ismail , L. W. Kin and O.C. Soon, "Enhanced User Authentication through Typing Biometrics with Artificial Neural Networks and K-Nearest Neighbor Algorithm", proc. Thirty-Fifth Asilomar Conference on Signals, Systems and Computers, vol. 2, pp. 911-915, 2001
  14. D. Bleha and M. Obaidat, "Dimensionality Reduction and Feature Extraction Applications in Identifying Computer Users", IEEE Trans. Syst., Man, Cybern., vol. 21, pp. 452-456, 1991