Keystroke Authentication with a Capacitive Display using Different Mobile Devices

Matthias Trojahn, Christian Schadewald, Frank Ortmeier

Abstract

.

References

  1. Banerjee, S. and Woodard, D. (2012). Biometric authentication and identification using keystroke dynamics: A survey. Journal of Pattern Recognition Research, 7:116-139.
  2. Buchoux, A. and Clarke, N. L. (2008). Deployment of keystroke analysis on a smartphone. In Proceedings of the 6th Australian Information Security & Management Conference.
  3. Campisi, P., Maiorana, E., and Neri, A. (2009). User authentication using keystroke dynamics for cellular phones. In IET Signal Processing, volume 3, Issue: 4, pages 333-341.
  4. Choras, M. and Mroczkowski, P. (2007). Keystroke dynamics for biometrics identification. In Proceedings of the 8th international conference on Adaptive and Natural Computing Algorithms, Part II, ICANNGA 7807, pages 424-431, Berlin, Heidelberg. Springer-Verlag.
  5. Clarke, N. L. and Furnell, S. M. (2006). Authenticating mobile phone users using keystroke analysis. In Int. J. Inf. Secur, volume 6, pages 1-14, Berlin, Heidelberg. Springer-Verlag.
  6. Luca, A. d., Hang, A., Brudy, F., Lindner, C., and Hussmann, H. (2012). Touch me once and i know it's you!: implicit authentication based on touch screen patterns. In CHI'12, pages 987-996.
  7. Miluzzo, E., Varshavsky, A., Balakrishnan, S., and Choudhury, R. R. (2012). Tapprints: your finger taps have fingerprints. In Proceedings of the 10th international conference on Mobile systems, applications, and services, MobiSys 7812, pages 323-336, New York, NY, USA. ACM.
  8. Obaidat, M. and Sadoun, B. (1997). Verification of computer users using keystroke dynamics. Systems, Man, and Cybernetics, Part B: Cybernetics, IEEE Transactions on, 27(2):261-269.
  9. O'Gorman, L. (2003). Comparing passwords, tokens, and biometrics for user authentication. Proceedings of the IEEE, 91(12):2019-2020.
  10. Trojahn, M. and Ortmeier, F. (2012). Biometric authentication through a virtual keyboard for smartphones. International Journal of Computer Science & Information Technology (IJCSIT).
  11. Trojahn, M. and Ortmeier, F. (2013). Toward mobile authentication with keystroke dynamics on mobile phones. 7th International Symposium on Security and Multimodality in Pervasive Environment (SMPE).
  12. Twentyman, J. (2009). Lost smartphones pose significant corporate risk. http://www.scmagazineuk.com/lostsmartphones-pose-significant-corporaterisk/article/126759/. [Online; accessed 01-March2013].
  13. Vielhauer, C. (2006). Biometric User Authentication for IT Security: From Fundamentals to Handwriting. Advances in information security. Springer-Verlag.
Download


Paper Citation


in Harvard Style

Trojahn M., Schadewald C. and Ortmeier F. (2013). Keystroke Authentication with a Capacitive Display using Different Mobile Devices . In Proceedings of the 10th International Conference on Security and Cryptography - Volume 1: SECRYPT, (ICETE 2013) ISBN 978-989-8565-73-0, pages 580-585. DOI: 10.5220/0004606105800585


in Bibtex Style

@conference{secrypt13,
author={Matthias Trojahn and Christian Schadewald and Frank Ortmeier},
title={Keystroke Authentication with a Capacitive Display using Different Mobile Devices},
booktitle={Proceedings of the 10th International Conference on Security and Cryptography - Volume 1: SECRYPT, (ICETE 2013)},
year={2013},
pages={580-585},
publisher={SciTePress},
organization={INSTICC},
doi={10.5220/0004606105800585},
isbn={978-989-8565-73-0},
}


in EndNote Style

TY - CONF
JO - Proceedings of the 10th International Conference on Security and Cryptography - Volume 1: SECRYPT, (ICETE 2013)
TI - Keystroke Authentication with a Capacitive Display using Different Mobile Devices
SN - 978-989-8565-73-0
AU - Trojahn M.
AU - Schadewald C.
AU - Ortmeier F.
PY - 2013
SP - 580
EP - 585
DO - 10.5220/0004606105800585