Abstract
To detect the novel impostors whose data patterns have never been learned previously in keystroke dynamics, two solutions are proposed in this paper. Unlike most other research in keystroke dynamics, this paper surveys the performance tradeoff and time consumption, which are valuable for practical implementation, of the solutions. Besides, it is our intention to attempt verifying computer users' identities based on pure numeric password which is more difficult than verification of any other kinds of passwords.
Original language | English |
---|---|
Pages (from-to) | 666-669 |
Number of pages | 4 |
Journal | Lecture Notes in Computer Science |
Volume | 3320 |
DOIs | |
Publication status | Published - 2004 |
Externally published | Yes |
Event | 5th International Conference, PDCAT 2004 - , Singapore Duration: 8 Dec 2004 → 10 Dec 2004 |