Dynamic Authentication by Typing Patterns TJHSST Senior Research Project Proposal Computer Systems Lab 2009-2010

نویسنده

  • Luke Knepper
چکیده

This project will analyze and test the accuracy of dynamic typing pattern authentication methods. The program will generate a dynamic set of text that the user will be prompted to type, and then it will feed the user’s typing characteristics through neural network structures. Experimentation will be done to determine the most accurate neural network structures and data collection conditions. This process will be an improvement on normal typing pattern authentication techniques, which use static passwords rather than dynamic text.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

TJHSST Computer Systems Lab Senior Research Project Economic Policy Simulation and Optimization 2008 - 2009

There are several variations on gubernatorial economic policy around the world. Given different populations and demographics, economic policy changes. How can we best predict the ramifications of a given policy? Can we produce an optimal policy? Computer simulations and optimization using genetic algorithms may be able to provide policy makers with the data to answer these questions.

متن کامل

Image Deblurring and Noise Reduction in Python TJHSST Senior Research Project Computer Systems Lab 2009-2010

In the world of photography and machine vision, blurry images can spell disaster. They can ruin an otherwise perfect photo or make it impossible for a computer to recognize the image or certain components of it for processing. The best way to counter this without taking another, clearer picture is to utilize deconvolution techniques to remove as much blur as possible. That is the design of this...

متن کامل

Keystroke Dynamics Authentication System Using Neural Network

The fact that computers regularly store private, sensitive and classified information makes it very important that we can confidently identify their users. Traditionally, this has been achieved through password authentication systems. However, these systems are far from perfect. For instance, if a password becomes compromised, it is no longer adequate for authenticating its rightful owner. In t...

متن کامل

Biometric Technologies for Online Student Authentication

In this work we present: i) an analysis of biometric technologies for online student authentication; ii) a case study on keystroke dynamics authentication applied to a real operational environment. Concisely, this work studies the biometric technologies and their advantages/disadvantages for online student authentication services. The analysis is made on the basis of three main pillars: perform...

متن کامل

Cloud Computing for Large-Scale Complex IT Systems

This proposal aims to extend and expand the work of the LSCITS Research Programme (RP) in its third, fourth, and fifth years (2010–2012) by extending the scope of the project into an exciting new area. The partners for this proposal are current LSCITS consortium members Bristol and St Andrews, both of whom have LSCITS PhD students working in cloud computing, and Aston University, an addition to...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2009