Author:
Clarke N.L.,Furnell S.M.,Lines B.M.,Reynolds P.L.
Abstract
The ability of third generation telephones to store sensitive information, such as financial records, digital certificates and company records, makes them desirable targets for impostors. This paper details the feasibility of a non‐intrusive subscriber authentication technique – the use of keystroke dynamics. This feasibility study comprises a number of investigations into the ability of neural networks to authenticate users successfully based on their interactions with a mobile phone keypad. The initial results are promising with network classification performing well, achieving a 9.8 per cent false rejection rate and an 11.0 per cent false acceptance rate.
Subject
Library and Information Sciences,Management Science and Operations Research,Business and International Management,Management Information Systems
Reference13 articles.
1. Ashbourn, J. (2000), Biometric: Advanced Identity Verification. The Complete Guide, Springer, London.
2. Bishop, M. (1995), Neural Networks for Pattern Recognition, Oxford University Press, Oxford.
3. Cho, S., Han, C., Han, D. and Kim, H. (2000), “Web based keystroke dynamics identity verification using neural networks”, Journal of Organisational Computing & Electronic Commerce, Vol. 10 No. 4, pp. 295‐307.
4. Clarke, N., Furnell, S., Rodwell, P. and Reynolds, P. (2001), “Acceptance of subscriber authentication for mobile telephony devices”, Computers & Security, Vol. 21 No. 3, pp. 220‐28.
5. Cope, J. (1990a), “Biometric systems of access control”, Electrotechnology, April/May, pp. 71‐4.
Cited by
31 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献