Abstract / Excerpt:
As technology advances, information management systems become more powerful and information security enforcement becomes more critical. This paper presents a more secure approach in authenticating users. It uses keystroke dynamics by employing a combination of the conventional approach and of the neural networks. This combined approach not only deals with users' conventional textual passwords but also with its corresponding unique typing patterns for tighter and more secure authentication. To achieve this, the proponents planned to have five phases in implementing keystroke dynamics: the Initialization stage, the Data Collection stage, the Retrieval Phase, the Adaptability stage, and the Recovery phase.
|Source Institution||Ateneo de Davao University|
|Authors||Duches Dianne B. Castañeda, Khimy Jyanina L. Iñigo, Larence O. Lao|
|Place of Publication||Davao City|
|Original Publication Date||March 1, 2005|