Using mouse strokes to verify user identity
As the technology advances, many interesting approaches have emerged to tackle the flaw of the traditional authentication techniques which verify users based on something that one knows or possesses. Not only do these systems expose their users to identity theft, users could also forget their passwo...
Saved in:
Main Author: | Toh, Jing Sheng. |
---|---|
Other Authors: | School of Computer Engineering |
Format: | Final Year Project |
Language: | English |
Published: |
2013
|
Subjects: | |
Online Access: | http://hdl.handle.net/10356/51958 |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
Institution: | Nanyang Technological University |
Language: | English |
Similar Items
-
Using mouse strokes to verify user identity
by: Cheong, Lichang.
Published: (2011) -
Analysis of user influence in slashdot
by: Tan, Qian Ting.
Published: (2011) -
Auto recording of user behaviours in cloud IDE
by: Zhang, Chixiong
Published: (2015) -
Discovery and analysis of social networks based on online user activities
by: Lauw, Hady Wirawan
Published: (2008) -
Can user choice alter experimental findings in human–computer interaction? : similarity attraction versus cognitive dissonance in social responses to synthetic speech
by: Lee, Kwan Min, et al.
Published: (2013)