A New Authentication Approach for People with Upper Extremity Impairment.
Brittany LewisJoshua HebertKrishna K. VenkatasubramanianMatthew ProvostKelly CharleboisPublished in: PerCom Workshops (2020)
Keyphrases
- identity authentication
- biometric authentication
- user authentication
- keystroke dynamics
- machine learning
- factor authentication
- security requirements
- security analysis
- authentication protocol
- information sharing
- neural network
- identity management
- data sets
- real time
- fuzzy vault
- personal authentication
- integrity verification
- database