Keystroke Dynamics for
Usable Passwords
There is a fundamental conflict in creating what we’d like to call a bullseye password: one’s that is both user-friendly and secure.
This fundamental conflict led our research group to the question of, ‘what can we create that makes passwords more secure while not jeopardizing user-friendliness?’
For greater security, we knew that we wanted to use second factor authentication.
An example of a biometric password used for second factor authentication is keystroke dynamics.
There is a fundamental conflict in creating what we’d like to call a bullseye password: one’s that is both user-friendly and secure.
This fundamental conflict led our research group to the question of, ‘what can we create that makes passwords more secure while not jeopardizing user-friendliness?’
For greater security, we knew that we wanted to use second factor authentication.
An example of a biometric password used for second factor authentication is keystroke dynamics.
-->
Our Code
Our Presentation