Keyphrases
- empirical studies
- user authentication
- password authentication
- authentication mechanism
- empirical analysis
- password based authenticated key exchange
- real world data sets
- keystroke dynamics
- uci datasets
- systematic review
- information security
- security requirements
- covert channel
- security analysis
- experimental design
- creation process
- authentication scheme
- key exchange protocol
- text categorization
- standard model
- theoretical analysis
- key management
- password guessing
- intrusion detection
- training data