Biometrics for internet-of-things security: A review
The large number of Internet-of-Things (IoT) devices that need interaction between smart
devices and consumers makes security critical to an IoT environment. Biometrics offers an …
devices and consumers makes security critical to an IoT environment. Biometrics offers an …
Security, privacy, and usability in continuous authentication: A survey
AF Baig, S Eskeland - Sensors, 2021 - mdpi.com
Continuous authentication has been proposed as a possible approach for passive and
seamless user authentication, using sensor data comprising biometric, behavioral, and …
seamless user authentication, using sensor data comprising biometric, behavioral, and …
A study on continuous authentication using a combination of keystroke and mouse biometrics
In this paper we focus on a context independent continuous authentication system that
reacts on every separate action performed by a user. We contribute with a robust dynamic …
reacts on every separate action performed by a user. We contribute with a robust dynamic …
User identification and authentication using multi-modal behavioral biometrics
KO Bailey, JS Okolica, GL Peterson - Computers & Security, 2014 - Elsevier
Biometric computer authentication has an advantage over password and access card
authentication in that it is based on something you are, which is not easily copied or stolen …
authentication in that it is based on something you are, which is not easily copied or stolen …
Keystroke dynamics on android platform
Currently people store more and more sensitive data on their mobile devices. Therefore it is
highly important to strengthen the existing authentication mechanisms. The analysis of …
highly important to strengthen the existing authentication mechanisms. The analysis of …
[HTML][HTML] CAB-IoT: Continuous authentication architecture based on Blockchain for internet of things
FH Al-Naji, R Zagrouba - Journal of King Saud University-Computer and …, 2022 - Elsevier
Raising incidents of security threats among active sessions is an increasing concern in IoT
environment. Continuous authentication was introducing to be superior to traditional …
environment. Continuous authentication was introducing to be superior to traditional …
[HTML][HTML] Continuous authentication by free-text keystroke based on CNN and RNN
Personal keystroke modes are difficult to imitate and can therefore be used for identity
authentication. The keystroke habits of a person can be learned according to the keystroke …
authentication. The keystroke habits of a person can be learned according to the keystroke …
Continuous authentication by free-text keystroke based on CNN plus RNN
L Xiaofeng, Z Shengfei, Y Shengwei - Procedia computer science, 2019 - Elsevier
Personal keystroke mode is difficult to imitate and can therefore be used for identity
authentication. According to the keystroke data when a person inputs free text, the keystroke …
authentication. According to the keystroke data when a person inputs free text, the keystroke …
[PDF][PDF] Keystroke dynamics authentication: a survey of free-text methods
A Alsultan, K Warwick - International Journal of Computer Science …, 2013 - researchgate.net
Current computer systems depend greatly on authentication methods in order to provide
sufficient protection to the data handled by these systems. Rather than using the common …
sufficient protection to the data handled by these systems. Rather than using the common …
A review on authentication methods
The Internet has consolidated itself as a very powerful platform that has changed the
communication and business transactions. Now, the number of users navigating through the …
communication and business transactions. Now, the number of users navigating through the …