A survey of keystroke dynamics biometrics

PS Teh, ABJ Teoh, S Yue - The Scientific World Journal, 2013 - Wiley Online Library
Research on keystroke dynamics biometrics has been increasing, especially in the last
decade. The main motivation behind this effort is due to the fact that keystroke dynamics …

Modern authentication schemes in smartphones and IoT devices: An empirical survey

MT Ahvanooey, MX Zhu, Q Li… - IEEE Internet of …, 2021 - ieeexplore.ieee.org
User authentication remains a challenging issue, despite the existence of a large number of
proposed solutions, such as traditional text-based, graphical-based, biometrics-based, Web …

A survey on behavioral biometric authentication on smartphones

A Mahfouz, TM Mahmoud, AS Eldin - Journal of information security and …, 2017 - Elsevier
Recent research has shown the possibility of using smartphones' sensors and accessories
to extract some behavioral attributes such as touch dynamics, keystroke dynamics and gait …

Improving accuracy, applicability and usability of keystroke biometrics on mobile touchscreen devices

D Buschek, A De Luca, F Alt - proceedings of the 33rd annual ACM …, 2015 - dl.acm.org
Authentication methods can be improved by considering implicit, individual behavioural
cues. In particular, verifying users based on typing behaviour has been widely studied with …

Touch gestures based biometric authentication scheme for touchscreen mobile phones

Y Meng, DS Wong, R Schlegel, L Kwok - Information Security and …, 2013 - Springer
Nowadays, touchscreen mobile phones make up a larger and larger share in the mobile
market. Users also often use their mobile phones (eg, Android phones) to store personal …

Exploring touch-screen biometrics for user identification on smart phones

J Angulo, E Wästlund - Privacy and Identity Management for Life: 7th IFIP …, 2012 - Springer
The use of mobile smart devices for storing sensitive information and accessing online
services is increasing. At the same time, methods for authenticating users into their devices …

Continuous mobile authentication using virtual key typing biometrics

T Feng, X Zhao, B Carbunar… - 2013 12th IEEE …, 2013 - ieeexplore.ieee.org
Due to the increasing popularity of mobile technologies, sensitive user information is often
stored on mobile devices. However, the essential task of mobile user authentication is …

A systematic literature review on latest keystroke dynamics based models

S Roy, J Pradhan, A Kumar, DRD Adhikary… - IEEE …, 2022 - ieeexplore.ieee.org
The purpose of this study is to conduct a comprehensive evaluation and analysis of the most
recent studies on the implications of keystroke dynamics (KD) patterns in user …

Evaluating the influence of targets and hand postures on touch-based behavioural biometrics

D Buschek, A De Luca, F Alt - Proceedings of the 2016 CHI Conference …, 2016 - dl.acm.org
Users' individual differences in their mobile touch behaviour can help to continuously verify
identity and protect personal data. However, little is known about the influence of GUI …

Reconciling user privacy and implicit authentication for mobile devices

SF Shahandashti, R Safavi-Naini, NA Safa - Computers & Security, 2015 - Elsevier
In an implicit authentication system, a user profile is used as an additional factor to
strengthen the authentication of mobile users. The profile consists of features that are …