Skip to main content

Showing 1–3 of 3 results for author: El-Abed, M

Searching in archive cs. Search in all archives.
.
  1. arXiv:1207.0784  [pdf, other

    cs.LG

    Web-Based Benchmark for Keystroke Dynamics Biometric Systems: A Statistical Analysis

    Authors: Romain Giot, Mohamad El-Abed, Christophe Rosenberger

    Abstract: Most keystroke dynamics studies have been evaluated using a specific kind of dataset in which users type an imposed login and password. Moreover, these studies are optimistics since most of them use different acquisition protocols, private datasets, controlled environment, etc. In order to enhance the accuracy of keystroke dynamics' performance, the main contribution of this paper is twofold. Firs… ▽ More

    Submitted 3 July, 2012; originally announced July 2012.

    Comments: The Eighth International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIHMSP 2012), Piraeus : Greece (2012)

  2. Fast computation of the performance evaluation of biometric systems: application to multibiometric

    Authors: Romain Giot, Mohamad El-Abed, Christophe Rosenberger

    Abstract: The performance evaluation of biometric systems is a crucial step when designing and evaluating such systems. The evaluation process uses the Equal Error Rate (EER) metric proposed by the International Organization for Standardization (ISO/IEC). The EER metric is a powerful metric which allows easily comparing and evaluating biometric systems. However, the computation time of the EER is, most of t… ▽ More

    Submitted 27 February, 2012; originally announced February 2012.

    Comments: Future Generation Computer Systems (2012)

  3. Keystroke Dynamics Authentication For Collaborative Systems

    Authors: Romain Giot, Mohamad El-Abed, Christophe Rosenberger

    Abstract: We present in this paper a study on the ability and the benefits of using a keystroke dynamics authentication method for collaborative systems. Authentication is a challenging issue in order to guarantee the security of use of collaborative systems during the access control step. Many solutions exist in the state of the art such as the use of one time passwords or smart-cards. We focus in this p… ▽ More

    Submitted 17 November, 2009; originally announced November 2009.

    Journal ref: The IEEE International Symposium on Collaborative Technologies and Systems (CTS), Baltimore : United States (2009)