Automatic signature verification: The state of the art
D Impedovo, G Pirlo - IEEE Transactions on Systems, Man, and …, 2008 - ieeexplore.ieee.org
In recent years, along with the extraordinary diffusion of the Internet and a growing need for
personal verification in many daily applications, automatic signature verification is being …
personal verification in many daily applications, automatic signature verification is being …
Mouse dynamics behavioral biometrics: A survey
Utilization of the Internet in our everyday lives has made us vulnerable in terms of privacy
and security of our data and systems. Therefore, there is a pressing need to protect our data …
and security of our data and systems. Therefore, there is a pressing need to protect our data …
Continuous mobile authentication using touchscreen gestures
Securing the sensitive data stored and accessed from mobile devices makes user
authentication a problem of paramount importance. The tension between security and …
authentication a problem of paramount importance. The tension between security and …
Graphical passwords: A survey
X Suo, Y Zhu, GS Owen - 21st Annual Computer Security …, 2005 - ieeexplore.ieee.org
The most common computer authentication method is to use alphanumerical usernames
and passwords. This method has been shown to have significant drawbacks. For example …
and passwords. This method has been shown to have significant drawbacks. For example …
User authentication based on mouse dynamics using deep neural networks: A comprehensive study
Recently conducted research demonstrated the potential use of mouse dynamics as a
behavioral biometric for user authentication systems. However, the state-of-the-art methods …
behavioral biometric for user authentication systems. However, the state-of-the-art methods …
The gaze and mouse signal as additional source for user fingerprints in browser applications
In this work, we inspect different data sources for browser fingerprints. We show which
disadvantages and limitations browser statistics have and how this can be avoided with …
disadvantages and limitations browser statistics have and how this can be avoided with …
A graphical-based password keystroke dynamic authentication system for touch screen handheld mobile devices
TY Chang, CJ Tsai, JH Lin - Journal of Systems and Software, 2012 - Elsevier
Since touch screen handheld mobile devices have become widely used, people are able to
access various data and information anywhere and anytime. Most user authentication …
access various data and information anywhere and anytime. Most user authentication …
The shoulder surfing resistant graphical password authentication technique
MAS Gokhale, VS Waghmare - Procedia Computer Science, 2016 - Elsevier
Nowadays computer as well as information security is the most significant challenge.
Authorized users should access the system or information. Authorization can't occur without …
Authorized users should access the system or information. Authorization can't occur without …
Biometric authentication using mouse gesture dynamics
B Sayed, I Traoré, I Woungang… - IEEE systems …, 2013 - ieeexplore.ieee.org
The mouse dynamics biometric is a behavioral biometric technology that extracts and
analyzes the movement characteristics of the mouse input device when a computer user …
analyzes the movement characteristics of the mouse input device when a computer user …
Yagp: Yet another graphical password strategy
H Gao, X Guo, X Chen, L Wang… - 2008 Annual computer …, 2008 - ieeexplore.ieee.org
Alphanumeric passwords are widely used in computer and network authentication to protect
users' privacy. However, it is well known that long, text-based passwords are hard for people …
users' privacy. However, it is well known that long, text-based passwords are hard for people …