Keystroke Authentication on Enhanced Needleman Alignment Algorithm

نویسندگان
چکیده

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Enhanced User Authentication Through Keystroke Biometrics

In this paper, we look at several metrics for keystroke-enhanced user authentication. We begin by introducing keystroke biometrics and looking at its advantages and disadvantages. We examine a statistical analysis method described in the current literature and show through experimental data how the metric of consecutive keystroke latencies is inadequate for user authentication. The insufficienc...

متن کامل

A Survey On Keystroke Authentication By Using Local Search Algorithm

In now a days Password authentication plays a vital role typing biometrics as a transparent layer of user authentication for security. Keystroke authentication provides security to the applications like electronic mail, banking and any other web services etc., There are several types of techniques to protect our passwords but it can be easily hacked by the hackers through so many algorithms. By...

متن کامل

Enhanced Knowledge-Based User Authentication Technique Via Keystroke Dynamics

Some common words (name, address, E-mail ID, password, ...), we press daily and we are habituated to press it in same rhythm, which is unique and can be used to segregate and distinguish people. In this paper we are considering password as well as habitual rhythm of the entered password to enhance the security level in knowledge-based user authentication. Recognizing typing style promises a par...

متن کامل

Keystroke Dynamics Authentication

Everybody needs to authenticate himself on his computer before using it, or even before using different applications (email, e-commerce, intranet, . . . ). Most of the times, the adopted authentication procedure is the use of a classical couple of login and password. In order to be efficient and secure, the user must adopt a strict management of its credentials (regular changing of the password...

متن کامل

User Authentication Based On Keystroke Dynamics

The most common way to enforce access control is user authentication based on username and password. This form of access control has many flaws which make it vulnerable to hacking. Biometric authentication such as the keystroke dynamics is used in which the keyboard is used in order to identify users. Then the classifier is tailored to each user to find out whether the given user is genuine or ...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: Intelligent Information Management

سال: 2014

ISSN: 2160-5912,2160-5920

DOI: 10.4236/iim.2014.64021