Credential hardening by using touchstroke dynamics
Today, reliance on digital devices for daily routines has been shifted towards portable mobile devices. Therefore, the need for security enhancements within this platform is imminent. Numerous research works have been performed on strengthening password authentication by using keystroke dynamics bio...
| Main Authors: | Teh, Pin Shen, Teoh, Andrew Beng Jin, Yue, Shigang |
|---|---|
| Format: | Article |
| Language: | English |
| Published: |
Sunway University
2014
|
| Subjects: | |
| Online Access: | http://eprints.sunway.edu.my/404/ http://eprints.sunway.edu.my/404/1/SAJ_Vol%2011_35-54.pdf |
Similar Items
Statistical Fusion Approach on Keystroke Dynamics
by: Teh, Pin Shen, et al.
Published: (2007)
by: Teh, Pin Shen, et al.
Published: (2007)
Password Strengthening by Using Keystroke Dynamics
by: Teh, Pin Shen
Published: (2008)
by: Teh, Pin Shen
Published: (2008)
Rule-Based Approach For Detecting Advanced Persistent Threat Using Behavioral Features Of Credential Dumping Technique
by: Ali Mohamed, Nachaat Abdelatif
Published: (2022)
by: Ali Mohamed, Nachaat Abdelatif
Published: (2022)
Improved fuzzy hashing technique for biometric template protection
by: Ong, T. S., et al.
Published: (2014)
by: Ong, T. S., et al.
Published: (2014)
Typing Dynamics Biometric Authentication through Fuzzy Logic
by: Zhe, Jin, et al.
Published: (2008)
by: Zhe, Jin, et al.
Published: (2008)
Dynamic Handwritten Signature Verification Based on Statistical Quantization Mechanism
by: Ong, Thian Song, et al.
Published: (2009)
by: Ong, Thian Song, et al.
Published: (2009)
Identity credential issuance with trusted computing
by: Abd Aziz, Norazah, et al.
Published: (2009)
by: Abd Aziz, Norazah, et al.
Published: (2009)
Probabilistic random projections and speaker verification
by: Ying, Chong Lee, et al.
Published: (2007)
by: Ying, Chong Lee, et al.
Published: (2007)
Cancelable Biometrics Realization With Multispace Random Projections
by: Teoh, Andrew Beng Jin, et al.
Published: (2007)
by: Teoh, Andrew Beng Jin, et al.
Published: (2007)
Kernel Discriminant Embedding in face recognition
by: Han, Pang Ying, et al.
Published: (2011)
by: Han, Pang Ying, et al.
Published: (2011)
Regularized locality preserving discriminant embedding for face recognition
by: Pang, Ying Han, et al.
Published: (2012)
by: Pang, Ying Han, et al.
Published: (2012)
A Study on Optimal Face Ratio for Recognition Using Part-based Feature Extractor
by: Neo, Han Foon, et al.
Published: (2007)
by: Neo, Han Foon, et al.
Published: (2007)
Fingerprint images segmentation using two stages coarse to fine discrimination technique
by: Ong, Teng Sian, et al.
Published: (2003)
by: Ong, Teng Sian, et al.
Published: (2003)
Automatic fingerprint center point determination by using modified directional field and morphology
by: Teoh, Andrew Beng Jin, et al.
Published: (2003)
by: Teoh, Andrew Beng Jin, et al.
Published: (2003)
Behavioral analysis of students’ login credentials management in mobile environment
by: Katuk, Norliza, et al.
Published: (2013)
by: Katuk, Norliza, et al.
Published: (2013)
Support Vector Machines (SVM)-based biometric watermarking for offline handwritten signature
by: Cheng-Yaw, Low, et al.
Published: (2008)
by: Cheng-Yaw, Low, et al.
Published: (2008)
Fusion of LSB and DWT biometric watermarking for offline handwritten signature
by: Cheng-Yaw, Low, et al.
Published: (2008)
by: Cheng-Yaw, Low, et al.
Published: (2008)
Security of social network credentials for accessing course portal: Users’ experience
by: Katuk, Norliza, et al.
Published: (2015)
by: Katuk, Norliza, et al.
Published: (2015)
Exploring the role of social media credentials in mobile learning: The engagement perspective
by: Katuk, Norliza, et al.
Published: (2015)
by: Katuk, Norliza, et al.
Published: (2015)
Hardening of the smart experimental learning / Ahmad Abdul Azim Mansor
by: Mansor, Ahmad Abdul Azim
Published: (2007)
by: Mansor, Ahmad Abdul Azim
Published: (2007)
Offline Signature Verification through Biometric Strengthening
by: Ooi, Shih-Yin, et al.
Published: (2007)
by: Ooi, Shih-Yin, et al.
Published: (2007)
A study on partial face recognition of eye region
by: Teo, Chuan Chin, et al.
Published: (2007)
by: Teo, Chuan Chin, et al.
Published: (2007)
Neighbourhood Discriminant Locally Linear Embedding in Face Recognition
by: Han, Pang Ying, et al.
Published: (2008)
by: Han, Pang Ying, et al.
Published: (2008)
Touch-less palm print biometric system
by: Michael Goh Kah, Ong, et al.
Published: (2008)
by: Michael Goh Kah, Ong, et al.
Published: (2008)
Compatibility of biometric strengthening with probabilistic neural network
by: Shih-Yin, Ooi, et al.
Published: (2008)
by: Shih-Yin, Ooi, et al.
Published: (2008)
PalmHashing: a novel approach for cancelable biometrics
by: Tee, Connie, et al.
Published: (2005)
by: Tee, Connie, et al.
Published: (2005)
PalmHashing: A novel approach for dual-factor authentication
by: Tee, Connie, et al.
Published: (2004)
by: Tee, Connie, et al.
Published: (2004)
Reliable template protection technique for biometric authentication
by: Ong, Teng Sian, et al.
Published: (2008)
by: Ong, Teng Sian, et al.
Published: (2008)
Dynamics of watermark position in audio watermarked
files using neural networks
by: Abubakar, Adamu, et al.
Published: (2017)
by: Abubakar, Adamu, et al.
Published: (2017)
Dynamic scene occlusion culling in architectural scenes based on dynamic bounding volume
by: Paunoo @ Balu, Baldeve
Published: (2006)
by: Paunoo @ Balu, Baldeve
Published: (2006)
Adaptive Mapreduce task scheduler in heterogeneous environment using dynamic calibration / Lu Xinzhu
by: Lu , Xinzhu
Published: (2017)
by: Lu , Xinzhu
Published: (2017)
CPU Thread Prioritization Using a Dynamic Quantum Time Round-Robin Algorithm
by: Mohammed, Maysoon A., et al.
Published: (2016)
by: Mohammed, Maysoon A., et al.
Published: (2016)
Decision making process in keystroke dynamics
by: Yaacob, Mohd Noorulfakhri, et al.
Published: (2020)
by: Yaacob, Mohd Noorulfakhri, et al.
Published: (2020)
Distribution of virtual machines using static and dynamic load balancing in cloud computing / Misbah Liaqat
by: Misbah , Liaqat
Published: (2017)
by: Misbah , Liaqat
Published: (2017)
Supervised Locally Linear Embedding in face recognition
by: Ying Han, Pang, et al.
Published: (2008)
by: Ying Han, Pang, et al.
Published: (2008)
Web information retrieval and monitoring using adaptive agent / Chong Yuen Beng
by: Chong, Yuen Beng
Published: (2001)
by: Chong, Yuen Beng
Published: (2001)
Generation of replaceable cryptographic keys from dynamic handwritten signatures
by: Yip, , WK, et al.
Published: (2006)
by: Yip, , WK, et al.
Published: (2006)
Secure Hashing of Dynamic Hand Signatures Using Wavelet-Fourier Compression with BioPhasor Mixing and 2N Discretization
by: Wai Kuan, Yip, et al.
Published: (2007)
by: Wai Kuan, Yip, et al.
Published: (2007)
Dynamic Packet Beaconing for GPSR Mobile Adhoc Position Based Routing Protocol Using Fuzzy Logic
by: Uddin, M., et al.
Published: (2015)
by: Uddin, M., et al.
Published: (2015)
Statics and dynamics solitons in Bose-Einstein condensates
by: Benseghir, A, et al.
Published: (2009)
by: Benseghir, A, et al.
Published: (2009)
Similar Items
-
Statistical Fusion Approach on Keystroke Dynamics
by: Teh, Pin Shen, et al.
Published: (2007) -
Password Strengthening by Using Keystroke Dynamics
by: Teh, Pin Shen
Published: (2008) -
Rule-Based Approach For Detecting Advanced Persistent Threat Using Behavioral Features Of Credential Dumping Technique
by: Ali Mohamed, Nachaat Abdelatif
Published: (2022) -
Improved fuzzy hashing technique for biometric template protection
by: Ong, T. S., et al.
Published: (2014) -
Typing Dynamics Biometric Authentication through Fuzzy Logic
by: Zhe, Jin, et al.
Published: (2008)