Typing-Proof: Usable, secure and low-cost two-factor authentication based on keystroke timings
Two-factor authentication (2FA) systems provide another layer of protection to users' accounts beyond password. Traditional hardware token based 2FA and software token based 2FA are not burdenless to users since they require users to read, remember, and type a onetime code in the process, and i...
Saved in:
Main Authors: | LIU, Ximming, LI, Yingjiu, DENG, Robert H. |
---|---|
Format: | text |
Language: | English |
Published: |
Institutional Knowledge at Singapore Management University
2018
|
Subjects: | |
Online Access: | https://ink.library.smu.edu.sg/sis_research/4211 https://ink.library.smu.edu.sg/context/sis_research/article/5214/viewcontent/p53_liu.pdf |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
Institution: | Singapore Management University |
Language: | English |
Similar Items
-
A Study of the Imitation, Collection and Usability Issues of Keystroke Biometrics
by: TEY, Chee Meng
Published: (2013) -
Time cost evaluation for executing RFID authentication protocols
by: CHIEW, Kevin, et al.
Published: (2010) -
Keystroke Timing Analysis of on-the-fly Web Apps
by: TEY, Chee Meng, et al.
Published: (2013) -
RFID mutual authentication protocols with universally composable security
by: SU, Chunhua, et al.
Published: (2011) -
When Human cognitive modeling meets PINs: User-independent inter-keystroke timing attacks
by: LIU, Ximing, et al.
Published: (2019)