Capturing Cognitive Fingerprints from Keystroke Dynamics

نویسندگان
چکیده

برای دانلود باید عضویت طلایی داشته باشید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Keystroke dynamics

This article is an introduction to keystroke dynamics. Keystroke dynamics is a biometric which is based on assumption that people type in uniquely characteristic manners. Keystroke dynamics is mainly used for verification, but also identification is possible. Also commercial products exist. Additionally, keystroke dynamics can be used to eavesdrop secure communications by guessing what was writ...

متن کامل

Cognitive Fingerprints

Ever since “True Names” by Vernor Vinge, identity has been recognized as our most valued possession in cyberspace. Attribution is a key concept in enabling trusted identities and deterring malicious activities. The rash of recent cyber-attacks targeting consumers, coupled with the massive amount of available digital data, has forced us to rethink our very notion of authentication as a one-shot ...

متن کامل

Keystroke Dynamics Authentication

Everybody needs to authenticate himself on his computer before using it, or even before using different applications (email, e-commerce, intranet, . . . ). Most of the times, the adopted authentication procedure is the use of a classical couple of login and password. In order to be efficient and secure, the user must adopt a strict management of its credentials (regular changing of the password...

متن کامل

A Hybrid Keystroke Authentication Dynamics

As time goes, the global access to information and recourses is becoming a routine and a necessity in our daily lives. Unfortunately this great increase in global accessibility brings great chances of intrusions and great attacks. In an effort to handle these new threats, automated identification techniques are now being sought. In this paper, a hybrid keystroke authentication dynamics is propo...

متن کامل

Continuous Authentication with Keystroke Dynamics

In this chapter we will discuss how keystroke dynamics can be used for true continuous authentication.We have collected keystroke dynamics data of 53 participants who used the computer freely and we have analysed the collected data. We will describe a system that decides on the genuineness of the user based on each and every single keystroke action of the current user and we will represent the ...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: IT Professional

سال: 2013

ISSN: 1520-9202

DOI: 10.1109/mitp.2013.52