Typing Dynamics Biometric Authentication through Fuzzy Logic

The request to protect sensitive data and computer systems from malicious impostors while allowing ease of access for legitimate users is one of the greatest challenges in the computer security field. Traditionally, conventional ID and passwords authentication schemes are used for controlling access...

Full description

Bibliographic Details
Main Authors: Zhe, Jin, Andrew Beng Jin, Teoh, Thian Song, Ong, Connie, Tee
Format: Conference or Workshop Item
Published: 2008
Subjects:
Online Access:http://shdl.mmu.edu.my/2928/