Applying empirical thresholding algorithm for a keystroke dynamics based authentication system
Through the application of a password-based authentication technique, users are granted permission to access a secure system when the username and password matches with that logged in database of the system. Furthermore, anyone who provides the correct username and password of a valid user will be a...
Saved in:
Main Authors: | Venugopal, Priya Chaliyath, Viji, Kamalan Saroja Angel |
---|---|
Format: | Article |
Language: | English |
Published: |
Universiti Utara Malaysia Press
2019
|
Subjects: | |
Online Access: | http://repo.uum.edu.my/26843/1/JICT%2018%204%202019%20383-413.pdf http://repo.uum.edu.my/26843/ http://jict.uum.edu.my/index.php/previous-issues/168-journal-of-information-and-communication-technology-jict-vol-18-no-4-october-2019 |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
Similar Items
-
Keystroke dynamic authentication in mobile cloud computing
by: Babaeizadeh, Mahnoush
Published: (2014) -
Keystroke dynamic authentication in mobile cloud computing
by: Babaeizadeh, Mahnoush, et al.
Published: (2014) -
Applying Keystroke Level Analysis to Facilitate the User Interface Design of Web-Based Complaint Management System (WCMS) at Universiti Utara Malaysia
by: Hasniah, Hassan
Published: (2009) -
Multi-Tap Mobile Phone Text Entry : Key-Press Operators For Keystroke Level Model
by: Srour, Ayman I. H.
Published: (2008) -
Decision making process in keystroke dynamics
by: Yaacob, Mohd Noorulfakhri, et al.
Published: (2020)