Downloads provided by UsageCounts
{"references": ["Bender, et al. \"Key sequence rhythm recognition system and method\", U.S. Pat. No. 7,206,938, April 2007.", "Bergadano et al., \"User authentication through keystroke dynamics\", ACM Transactions on Information and System Security, Volume 5 Issue 4, November 2002 Pages 367-397.", "Bryce, Scott, \"Cryptograms\", http://scottbryce.com/cryptograms/stats.htm, accessed March 20, 2015.", "Cho et al., \"Apparatus for authenticating an individual based on a typing pattern by using a neural network system\", U.S. Pat. No. 6,151,593, November 2000.", "Cornell University, \"English Letter Frequency\" https://www.math.cornell.edu/~mec/2003-2004/cryptography/subs/frequencies.htm, accessed Nov 18, 2016.", "Deng Y. and Zhong Y., \"Keystroke Dynamics User Authentication Based on Gaussian Mixture Model and Deep Belief Nets\", ISRN Signal Processing Volume 2013 (2013), Article ID 565183.", "Ferguson N., Schneier B., Kohno T. \"Cryptography Engineering. Design Principles and Practical Applications,\" Wiley Publishing, Inc., 2010.", "Garcia; John D. \"Personal identification apparatus\", U.S. Pat. No. 4,621,334, November 1986.", "Gonzalez C., Avila M., and Moreno R, \"Continuous Authentication Using User's Typing Rhythm and Application Selection for Security of Mobile Electronic Devices\", U.S. Patent Application #62295130, Feb 2016.\n[10]\tL\u00edvia et al., \"User Authentication Through Typing Biometrics Features\", IEEE Transactions on Signal Processing, Vol. 53, No. 2, February 2005.\n[11]\tRangnath Dholi P., Chaudhar K. P., \"Typing Pattern Recognition Using Keystroke Dynamics\", Mobile Communication and Power Engineering, Volume 296 of the. series Communications in Computer and Information Science pp 275-280, 2013.\n[12]\tSerpa, Michael Lawrence, \"System and method for user authentication with enhanced passwords\", U. S. Pat No. 6,954,862, Oct 2005.\n[13]\tLarry V. Hedges (1981). \"Distribution theory for Glass' estimator of effect size and related estimators\". Journal of Educational Statistics. 6 (2): 107\u2013128."]}
When communicating using private and secure keys, there is always the doubt as to the identity of the message creator. We introduce an algorithm that uses the personal typing rhythm (keystroke dynamics) of the message originator to increase the trust of the authenticity of the message originator by the message recipient. The methodology proposes the use of a Rhythm Certificate Authority (RCA) to validate rhythm information. An illustrative example of the communication between Bob and Alice and the RCA is included. An algorithm of how to communicate with the RCA is presented. This RCA can be an independent authority or an enhanced Certificate Authority like the one used in public key infrastructure (PKI).
Personal rhythm, public-key encryption, digital signature, keystroke dynamics., authentication
Personal rhythm, public-key encryption, digital signature, keystroke dynamics., authentication
| selected citations These citations are derived from selected sources. This is an alternative to the "Influence" indicator, which also reflects the overall/total impact of an article in the research community at large, based on the underlying citation network (diachronically). | 0 | |
| popularity This indicator reflects the "current" impact/attention (the "hype") of an article in the research community at large, based on the underlying citation network. | Average | |
| influence This indicator reflects the overall/total impact of an article in the research community at large, based on the underlying citation network (diachronically). | Average | |
| impulse This indicator reflects the initial momentum of an article directly after its publication, based on the underlying citation network. | Average |
| views | 3 | |
| downloads | 4 |

Views provided by UsageCounts
Downloads provided by UsageCounts