1 code implementation • 14 Jan 2021 • Alejandro Acien, Aythami Morales, John V. Monaco, Ruben Vera-Rodriguez, Julian Fierrez
We study the performance of Long Short-Term Memory networks for keystroke biometric authentication at large scale in free-text scenarios.
no code implementations • 15 May 2020 • Aythami Morales, Alejandro Acien, Julian Fierrez, John V. Monaco, Ruben Tolosana, Ruben Vera-Rodriguez, Javier Ortega-Garcia
Behavioral biometrics can be powerful tools in this fight.
no code implementations • 7 Apr 2020 • Alejandro Acien, John V. Monaco, Aythami Morales, Ruben Vera-Rodriguez, Julian Fierrez
We study the suitability of keystroke dynamics to authenticate 100K users typing free-text.
no code implementations • 10 Mar 2017 • John V. Monaco, Manuel M. Vindiola
The bound to factor large integers is dominated by the computational effort to discover numbers that are smooth, typically performed by sieving a polynomial sequence.
1 code implementation • 24 Sep 2016 • John V. Monaco, Charles C. Tappert
There are numerous opportunities for adversaries to observe user behavior remotely on the web.
Cryptography and Security
2 code implementations • 13 Jul 2016 • John V. Monaco, Charles C. Tappert
The partially observable hidden Markov model is an extension of the hidden Markov Model in which the hidden state is conditioned on an independent Markov chain.