Method of dynamic real-time authentication
To solve the problem organization’s insider threats which was brought by internal staff through identity spoofing. A method of dynamic real-time authentication was presented. By faking exceptions of mouse to build dynamic authentication, when continuously consecutive authentication were abnormal, us...
Saved in:
Main Authors: | Chuan-wu MAO, Yang CHENG, Wen-ming YU |
---|---|
Format: | Article |
Language: | English |
Published: |
POSTS&TELECOM PRESS Co., LTD
2016-03-01
|
Series: | 网络与信息安全学报 |
Subjects: | |
Online Access: | http://www.cjnis.com.cn/thesisDetails#10.11959/j.issn.2909-109x.2016.00040 |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
Similar Items
-
Novel continuous identity authentication method based on mouse behavior
by: Cong YI, et al.
Published: (2022-10-01) -
User authentication of industrial internet based on HHT transform of mouse behavior
by: Yigong ZHANG, et al.
Published: (2022-06-01) -
Research on smart authentication authorization and accounting in next generation network
by: ZHANG Hong
Published: (2006-01-01) -
Mutual authentication scheme based on the TPM cloud computing platform
by: Zhen-peng LIU, et al.
Published: (2012-11-01) -
Identity authentication scheme based on identity-based encryption
by: Ren-ji HUANG, et al.
Published: (2016-06-01)