Using mouse strokes to verify user identity

As the technology advances, many interesting approaches have emerged to tackle the flaw of the traditional authentication techniques which verify users based on something that one knows or possesses. Not only do these systems expose their users to identity theft, users could also forget their passwo...

Full description

Bibliographic Details
Main Author: Toh, Jing Sheng.
Other Authors: School of Computer Engineering
Format: Final Year Project (FYP)
Language:English
Published: 2013
Subjects:
Online Access:http://hdl.handle.net/10356/51958