Comunicação apresentada na 2nd Annual International Conference on Global e-Security, Docklands, UK, 20 - 22 April 2006.Most computer systems are secured using a login id and password. When computers are connected to the internet, they become more vulnerable as more machines are available to attack them. In this paper, we present a novel method for protecting/enhancing login protection that can reduce the potential threat of internet connected computers. Our method is based on and enhancement to login id/password based on keystroke dynamics. We employ a novel authentication algorithm based on a probabilistic neural network. Our results indicate that we can achieve an equal error rate of less than 5%, comparable to what is achieved with ...
In the modern day and age, credential based authentication systems no longer provide the level of se...
Through the application of a password-based authentication technique, users are granted permission t...
Computer Authentication is a critical component of most computer systems – especially those used in...
The majority of computer systems employ a login ID and password as the principal method for access s...
The majority of computer systems employ a login ID and password as the principal method for access s...
Computer Authentication is a critical component of most computer systems, especially those used in e...
Security is a critical component of most computer systems – especially those used in E-commerce acti...
A literature review was done to find that there are still issues with writing passwords. From the in...
The emergence of global network access has promoted increased chances of malicious attack and intrus...
Pure hardware based biometric systems of user authentication have low rate of errors but increase c...
The use of computer has increased rapidly as well as the use of internet applications such as e-comm...
In today’s age the use of computers has increased exponentially with a variety of online application...
The emergence of global network access has promoted increased chances of malicious attack and intrus...
In this paper, typing biometrics is applied as an additional security measure to the password-based ...
Biometric security systems enable more secure authentication methods to access a computer system's r...
In the modern day and age, credential based authentication systems no longer provide the level of se...
Through the application of a password-based authentication technique, users are granted permission t...
Computer Authentication is a critical component of most computer systems – especially those used in...
The majority of computer systems employ a login ID and password as the principal method for access s...
The majority of computer systems employ a login ID and password as the principal method for access s...
Computer Authentication is a critical component of most computer systems, especially those used in e...
Security is a critical component of most computer systems – especially those used in E-commerce acti...
A literature review was done to find that there are still issues with writing passwords. From the in...
The emergence of global network access has promoted increased chances of malicious attack and intrus...
Pure hardware based biometric systems of user authentication have low rate of errors but increase c...
The use of computer has increased rapidly as well as the use of internet applications such as e-comm...
In today’s age the use of computers has increased exponentially with a variety of online application...
The emergence of global network access has promoted increased chances of malicious attack and intrus...
In this paper, typing biometrics is applied as an additional security measure to the password-based ...
Biometric security systems enable more secure authentication methods to access a computer system's r...
In the modern day and age, credential based authentication systems no longer provide the level of se...
Through the application of a password-based authentication technique, users are granted permission t...
Computer Authentication is a critical component of most computer systems – especially those used in...