Keystroke Authentication with a Capacitive Display using Different Mobile Devices
Matthias Trojahn, Christian Schadewald, Frank Ortmeier
2013
Abstract
.
References
- Banerjee, S. and Woodard, D. (2012). Biometric authentication and identification using keystroke dynamics: A survey. Journal of Pattern Recognition Research, 7:116-139.
- Buchoux, A. and Clarke, N. L. (2008). Deployment of keystroke analysis on a smartphone. In Proceedings of the 6th Australian Information Security & Management Conference.
- Campisi, P., Maiorana, E., and Neri, A. (2009). User authentication using keystroke dynamics for cellular phones. In IET Signal Processing, volume 3, Issue: 4, pages 333-341.
- Choras, M. and Mroczkowski, P. (2007). Keystroke dynamics for biometrics identification. In Proceedings of the 8th international conference on Adaptive and Natural Computing Algorithms, Part II, ICANNGA 7807, pages 424-431, Berlin, Heidelberg. Springer-Verlag.
- Clarke, N. L. and Furnell, S. M. (2006). Authenticating mobile phone users using keystroke analysis. In Int. J. Inf. Secur, volume 6, pages 1-14, Berlin, Heidelberg. Springer-Verlag.
- Luca, A. d., Hang, A., Brudy, F., Lindner, C., and Hussmann, H. (2012). Touch me once and i know it's you!: implicit authentication based on touch screen patterns. In CHI'12, pages 987-996.
- Miluzzo, E., Varshavsky, A., Balakrishnan, S., and Choudhury, R. R. (2012). Tapprints: your finger taps have fingerprints. In Proceedings of the 10th international conference on Mobile systems, applications, and services, MobiSys 7812, pages 323-336, New York, NY, USA. ACM.
- Obaidat, M. and Sadoun, B. (1997). Verification of computer users using keystroke dynamics. Systems, Man, and Cybernetics, Part B: Cybernetics, IEEE Transactions on, 27(2):261-269.
- O'Gorman, L. (2003). Comparing passwords, tokens, and biometrics for user authentication. Proceedings of the IEEE, 91(12):2019-2020.
- Trojahn, M. and Ortmeier, F. (2012). Biometric authentication through a virtual keyboard for smartphones. International Journal of Computer Science & Information Technology (IJCSIT).
- Trojahn, M. and Ortmeier, F. (2013). Toward mobile authentication with keystroke dynamics on mobile phones. 7th International Symposium on Security and Multimodality in Pervasive Environment (SMPE).
- Twentyman, J. (2009). Lost smartphones pose significant corporate risk. http://www.scmagazineuk.com/lostsmartphones-pose-significant-corporaterisk/article/126759/. [Online; accessed 01-March2013].
- Vielhauer, C. (2006). Biometric User Authentication for IT Security: From Fundamentals to Handwriting. Advances in information security. Springer-Verlag.
Paper Citation
in Harvard Style
Trojahn M., Schadewald C. and Ortmeier F. (2013). Keystroke Authentication with a Capacitive Display using Different Mobile Devices . In Proceedings of the 10th International Conference on Security and Cryptography - Volume 1: SECRYPT, (ICETE 2013) ISBN 978-989-8565-73-0, pages 580-585. DOI: 10.5220/0004606105800585
in Bibtex Style
@conference{secrypt13,
author={Matthias Trojahn and Christian Schadewald and Frank Ortmeier},
title={Keystroke Authentication with a Capacitive Display using Different Mobile Devices},
booktitle={Proceedings of the 10th International Conference on Security and Cryptography - Volume 1: SECRYPT, (ICETE 2013)},
year={2013},
pages={580-585},
publisher={SciTePress},
organization={INSTICC},
doi={10.5220/0004606105800585},
isbn={978-989-8565-73-0},
}
in EndNote Style
TY - CONF
JO - Proceedings of the 10th International Conference on Security and Cryptography - Volume 1: SECRYPT, (ICETE 2013)
TI - Keystroke Authentication with a Capacitive Display using Different Mobile Devices
SN - 978-989-8565-73-0
AU - Trojahn M.
AU - Schadewald C.
AU - Ortmeier F.
PY - 2013
SP - 580
EP - 585
DO - 10.5220/0004606105800585