-
2
-
-
0025541584
-
Computer-access security systems using keystroke dynamics
-
S. Bleha, C. Slivinsky, B. Hussein, Computer-access security systems using keystroke dynamics, IEEE Trans. Pattern Anal. Mach. Intell. PAMI-12(12) (1990) 1217-1222.
-
(1990)
IEEE Trans. Pattern Anal. Mach. Intell.
, vol.PAMI-12
, Issue.12
, pp. 1217-1222
-
-
Bleha, S.1
Slivinsky, C.2
Hussein, B.3
-
3
-
-
0039921279
-
User identification via keystroke characteristics of typed names using neural networks
-
M. Brown, S.J. Rogers, User identification via keystroke characteristics of typed names using neural networks, Int. J. Man-Mach. Stud. 39(6) (1993) 999-1014.
-
(1993)
Int. J. Man-Mach. Stud.
, vol.39
, Issue.6
, pp. 999-1014
-
-
Brown, M.1
Rogers, S.J.2
-
4
-
-
0029304865
-
Human and machine recognition of human face images: A survey
-
R. Chellappa, C.L. Wilson, S. Sirohey, Human and machine recognition of human face images: A survey, in: Proceeding of the IEEE, Vol. 83, 1995, pp. 705-741.
-
(1995)
In: Proceeding of the IEEE
, vol.83
, pp. 705-741
-
-
Chellappa, R.1
Wilson, C.L.2
Sirohey, S.3
-
5
-
-
0003618392
-
-
Erlbaum Associates, Hillsdale, NJ
-
E. Cureton, Factor analysis, an applied approach, Erlbaum Associates, Hillsdale, NJ, 1983.
-
(1983)
Factor Analysis, An Applied Approach
-
-
Cureton, E.1
-
6
-
-
0027700869
-
High confidence visual recognition of persons by a test of statistical independence
-
J.G. Daugman, High confidence visual recognition of persons by a test of statistical independence, IEEE Trans. Pattern Anal. Mach. Intell. 15(11), (1993).
-
(1993)
IEEE Trans. Pattern Anal. Mach. Intell.
, vol.15
, Issue.11
-
-
Daugman, J.G.1
-
7
-
-
0022150488
-
Speaker recognition-identifying people by their voices
-
G.R. Doddington, Speaker recognition-identifying people by their voices, Proceedings of the IEEE, Vol. 73, issue no. 11, 1985, 1651-1664.
-
(1985)
Proceedings of the IEEE
, vol.73
, Issue.11
, pp. 1651-1664
-
-
Doddington, G.R.1
-
9
-
-
0343700185
-
Authentication by keystroke timing: Some prelimary results
-
Rand Corporation
-
R. Gaines, W. Lisowski, S. Press, N. Shapiro, Authentication by keystroke timing: some prelimary results. Rand Rep. R-2560-NSF, Rand Corporation, 1980.
-
(1980)
Rand Rep. R-2560-NSF
-
-
Gaines, R.1
Lisowski, W.2
Press, S.3
Shapiro, N.4
-
12
-
-
38249026503
-
An application of fuzzy algorithms in a computer access security system
-
Hussien B., McLaren R., Bleha S. An application of fuzzy algorithms in a computer access security system. Pattern Recog. Lett. 9:1989;39-43.
-
(1989)
Pattern Recog. Lett.
, vol.9
, pp. 39-43
-
-
Hussien, B.1
McLaren, R.2
Bleha, S.3
-
13
-
-
0022507719
-
Fingerprint identification using graph matching
-
Isenor D.K., Zaky S.G. Fingerprint identification using graph matching. Pattern Recog. 19(2):1986;113-222.
-
(1986)
Pattern Recog.
, vol.192
, pp. 113-222
-
-
Isenor, D.K.1
Zaky, S.G.2
-
14
-
-
0025384135
-
Identity authorization based on keystroke latencies
-
Joyce R., Gupta G. Identity authorization based on keystroke latencies. Commun. ACM. 33(2):1990;168-176.
-
(1990)
Commun. ACM
, vol.332
, pp. 168-176
-
-
Joyce, R.1
Gupta, G.2
-
15
-
-
0005415015
-
Voiceprint identification
-
Kersta L.G. Voiceprint identification. Nature. 196:1962;1253-1257.
-
(1962)
Nature
, vol.196
, pp. 1253-1257
-
-
Kersta, L.G.1
-
16
-
-
0023843707
-
Verifying identity via keystroke characteristics
-
Leggett J., Williams G. Verifying identity via keystroke characteristics. Int. J. Man-Mach. Stud. 28(1):1988;67-76.
-
(1988)
Int. J. Man-Mach. Stud.
, vol.281
, pp. 67-76
-
-
Leggett, J.1
Williams, G.2
-
18
-
-
0005322028
-
Optimizing digraph-latency based biometric typist verification systems: Inter and intra typists differences in digraph latency distributions
-
Mahar D., Napier R., Wagner M., Laverty W., Henderson R., Hiron M. Optimizing digraph-latency based biometric typist verification systems: inter and intra typists differences in digraph latency distributions. Int. J. Human-Comp. Stud. 43:1995;579-592.
-
(1995)
Int. J. Human-Comp. Stud.
, vol.43
, pp. 579-592
-
-
Mahar, D.1
Napier, R.2
Wagner, M.3
Laverty, W.4
Henderson, R.5
Hiron, M.6
-
19
-
-
84936893490
-
Vital sings of identity
-
B. Miller, Vital sings of identity, IEEE Spectrum, 1994, pp. 22-30.
-
(1994)
IEEE Spectrum
, pp. 22-30
-
-
Miller, B.1
-
21
-
-
0028514601
-
An authentication service for computer networks
-
Neuman C., Ts'o T. An authentication service for computer networks. IEEE Commun. 32(9):1994;33-38.
-
(1994)
IEEE Commun.
, vol.329
, pp. 33-38
-
-
Neuman, C.1
Ts'o, T.2
-
23
-
-
0004210306
-
-
Addison-Wesley, Reading, MA
-
J.T. Tou, R.C Gonzalez, Pattern recognition principles, Addison-Wesley, Reading, MA, 1981.
-
(1981)
Pattern Recognition Principles
-
-
Tou, J.T.1
Gonzalez, R.C.2
-
24
-
-
0031234213
-
Face recognition: Eigenface, elastic matching and neural nets
-
September
-
J. Zhang, Y. Yan, M. Lades, Face recognition: eigenface, elastic matching and neural nets, Proceedings of the IEEE, vol. 85, issue no. 9, September 1997, pp. 1423-1435.
-
(1997)
Proceedings of the IEEE
, vol.85
, Issue.9
, pp. 1423-1435
-
-
Zhang, J.1
Yan, Y.2
Lades, M.3
|