A Three-Step Authentication Model for Mobile Phone User Using Keystroke Dynamics

The use of keystroke dynamics for user authentication has evolved over the years and has found its application in mobile phones. But the primary challenge with mobile phones is that they can be used in any position. Thus, it becomes critical to analyze the use of keystroke dynamics using the data co...

Full description

Bibliographic Details
Main Authors: Baljit Singh Saini, Parminder Singh, Anand Nayyar, Navdeep Kaur, Kamaljit Singh Bhatia, Shaker El-Sappagh, Jong-Wan Hu
Format: Article
Language:English
Published: IEEE 2020-01-01
Series:IEEE Access
Subjects:
Online Access:https://ieeexplore.ieee.org/document/9139213/

Similar Items