User authentication using keystroke recognition

7Citations
Citations of this article
6Readers
Mendeley users who have this article in their library.
Get full text

Abstract

This Paper represents technique for user authentication using keystroke dynamics. In this paper we have included Inter key time, Key hold time as well as some other keystroke features to verify the user. As the user types a combination of string, its key hold time and inter key time is noted, which is then compared with trusted user values using Euclidean distance. Then token system is used to check whether user is valid or not. It has improved user authentication such that Type 2 error is 0 % but type 1 error is 30 %. © 2013 Springer.

Cite

CITATION STYLE

APA

Garg, U., & Meena, Y. K. (2013). User authentication using keystroke recognition. In Advances in Intelligent Systems and Computing (Vol. 174 AISC, pp. 131–136). Springer Verlag. https://doi.org/10.1007/978-81-322-0740-5_17

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free