Novel continuous identity authentication method based on mouse behavior
With the rapid development of Internet technologies, security issues have always been the hot topics.Continuous identity authentication based on mouse behavior plays a crucial role in protecting computer systems, but there are still some problems to be solved.Aiming at the problems of low authentica...
Saved in:
Main Authors: | Cong YI, Jun HU |
---|---|
Format: | Article |
Language: | English |
Published: |
POSTS&TELECOM PRESS Co., LTD
2022-10-01
|
Series: | 网络与信息安全学报 |
Subjects: | |
Online Access: | http://www.cjnis.com.cn/thesisDetails#10.11959/j.issn.2096-109x.2022067 |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
Similar Items
-
User authentication of industrial internet based on HHT transform of mouse behavior
by: Yigong ZHANG, et al.
Published: (2022-06-01) -
P2P network identity authentication mechanism based on trusted alliance
by: Yingying CHEN, et al.
Published: (2020-04-01) -
Method of dynamic real-time authentication
by: Chuan-wu MAO, et al.
Published: (2016-03-01) -
Multi-factor identity authentication scheme for trusted sharing of cultural resources
by: Miaomiao WANG, et al.
Published: (2023-10-01) -
Study of cross-domain identity authentication in SOA environment
by: Jing-jing GUO, et al.
Published: (2016-11-01)