-
1
-
-
0016939145
-
Automatic recognition of speakers from their voices
-
Atal B.S. Automatic recognition of speakers from their voices. Proceedings of the IEEE 64 (1976) 460-475
-
(1976)
Proceedings of the IEEE
, vol.64
, pp. 460-475
-
-
Atal, B.S.1
-
2
-
-
33748908914
-
-
BioSec, 2003. BioSec: Biometric and Security. www.biosec.org/
-
-
-
-
3
-
-
33748885558
-
-
BioVision, 2003. Roadmap for Biometric in Europe to 2010. Available: www.eubiometricsforum.com/dmdocuments/BIOVISION_Roadmap.pdf (Accessed: 2004, July 27)
-
-
-
-
4
-
-
33748915382
-
-
BKnC, 2003. A Biometric Research Agenda and the Course of Biometrics Research. International Conference on Biometric Authentication. Biometric Knowledge Center, West Virginia University. www.wvu.edu/~bknc/BiometricResearchAgenda.pdf
-
-
-
-
5
-
-
0003429117
-
Are passfaces more usable than passwords? A field trial investigation
-
McDonald S., Waern Y., and Cockton G. (Eds), Springer, Sunderland, UK
-
Brostoff S., and Sasse A. Are passfaces more usable than passwords? A field trial investigation. In: McDonald S., Waern Y., and Cockton G. (Eds). People and Computers XIV-Usability or Else! Proceedings of HCI 2000 (2000), Springer, Sunderland, UK 405-424
-
(2000)
People and Computers XIV-Usability or Else! Proceedings of HCI 2000
, pp. 405-424
-
-
Brostoff, S.1
Sasse, A.2
-
6
-
-
0029393187
-
Person identification using multiple cues
-
Brunelli R., and Falavigna D. Person identification using multiple cues. IEEE Transactions on PAMI 12 10 (1995) 955-966
-
(1995)
IEEE Transactions on PAMI
, vol.12
, Issue.10
, pp. 955-966
-
-
Brunelli, R.1
Falavigna, D.2
-
7
-
-
33748912799
-
-
BWG, 2000. Best Practices in Testing and Reporting Performance in Biometric Devices. Biometrics Working Group (UK). Version 1.0.
-
-
-
-
8
-
-
0031233424
-
Speaker recognition: a tutorial
-
Campbell J.P. Speaker recognition: a tutorial. Proceedings of the IEEE 85 9 (1997) 1437-1462
-
(1997)
Proceedings of the IEEE
, vol.85
, Issue.9
, pp. 1437-1462
-
-
Campbell, J.P.1
-
9
-
-
33748896352
-
-
CIC, 2004. Communication Intelligence Corporation, 'iSign for Java,' www.cic.com/support/faq/iSign/Java/iSignjava.html
-
-
-
-
10
-
-
33748902533
-
-
Citizenship & Immigration Canada, 2003. Tracking Public Perception of Biometrics. Available at: www.cic.gc.ca/english/press/03/poll-biometrics-e.pdf (Accessed: 2004, July 27).
-
-
-
-
11
-
-
0033738539
-
-
Doddignton, G.R., Przybocki, M.A., Martin, A.F., Reynolds, D.A., 2000. The NIST speaker recognition evaluation-Overview, methodology, systems, results, perspective. Speech Communication 31 (2/3), 225-254.
-
-
-
-
12
-
-
33748908525
-
-
Economist, 2003. Prepare to be scanned-will biometric passports improve security? The Economist Technology Quarterly, 20-22.
-
-
-
-
13
-
-
84948688880
-
-
Friedman, B., & Felten, E., 2002. Informed consent in the Mozilla browser: implementing value-sensitive design. Proceedings of the 35 Annual Hawaii International Conference on System Sciences. Available at: www.ischool.washington.edu/networksecurity/outcomes.html (Accessed: 2004, July 27).
-
-
-
-
14
-
-
0033706465
-
Measuring usability: are effectiveness, efficiency, and satisfaction really correlated?
-
Frokjaer E., Hertzum M., and Hornbaek K. Measuring usability: are effectiveness, efficiency, and satisfaction really correlated?. CHI Letters 2 1 (2000) 345-352
-
(2000)
CHI Letters
, vol.2
, Issue.1
, pp. 345-352
-
-
Frokjaer, E.1
Hertzum, M.2
Hornbaek, K.3
-
15
-
-
33748898655
-
-
Gerd tom Markotten, D., 2002. User-centered security engineering. In Proceedings of The Fourth Nordic EurOpen/USENIX Conference, Helsinki, Finland.
-
-
-
-
16
-
-
0029203978
-
Methods of cognitive analysis in HCI
-
ADM, New York pp. 349-350
-
Gillan D., and Cooke N. Methods of cognitive analysis in HCI. Proceedings of the CHI'95 (1995), ADM, New York pp. 349-350
-
(1995)
Proceedings of the CHI'95
-
-
Gillan, D.1
Cooke, N.2
-
18
-
-
33748905847
-
-
Haptek, 2004. Haptek. www.haptek.com/
-
-
-
-
19
-
-
33748885378
-
-
Hitachi, 2002. Standardization of accuracy evaluation for biometric authentication in Japan. Available at: www.sdl.hitachi.co.jp/ipa_biotest/english/index_english.html (Accessed: 2004, July 27).
-
-
-
-
20
-
-
33748918107
-
-
International Biometric Group, 2003. Comparative Biometric Testing, Official Test Plan, version 2.13. Available at: www.biometricgroup.com/reports/public/comparative_biometric_testing.html (Accessed: 2004, July 14).
-
-
-
-
21
-
-
33748891161
-
-
International Biometric Group, 2004. Comparative Biometric Testing. Available at: www.ibgweb.com/reports/public/comparative_biometric_testing.html (Accessed: 2004, July 27).
-
-
-
-
22
-
-
33748910946
-
-
ISO 9241-11, 1998. Ergonomic requirements for office work with viual display terminals (VDTs)-Part 11: Guidance on usability.
-
-
-
-
23
-
-
33748916759
-
-
ISO/IEC JTC 1/SC 37 N457, 2004. Biometric Performance Testing and Reporting-Part 1: Test Principles. American National Standards Institute.
-
-
-
-
24
-
-
0003987134
-
-
Kluwer, Norwell, MA
-
Jain A.K., Bolle R., and Pankanti S. Biometrics-Personal Identification in Networked Society (1999), Kluwer, Norwell, MA
-
(1999)
Biometrics-Personal Identification in Networked Society
-
-
Jain, A.K.1
Bolle, R.2
Pankanti, S.3
-
25
-
-
33748891721
-
-
Kanade, T., 1973. Picture processing system by computer complex and recognition of human faces. Doctoral Dissertation, Kyoto University.
-
-
-
-
26
-
-
33748916127
-
-
Liu, S., Silverman, M., 2001. A practical Guide to Biometric Security Technology. IEEE Computer Society, IT Pro-Security.
-
-
-
-
27
-
-
33748898023
-
-
Mansfield, T. & Rejman-Greene, M., 2003. Feasibility Study on the Use of Biometrics in an Entitlement Scheme. Report UKPS, DVLA and the Home Office. IMSC/H07/D2.
-
-
-
-
29
-
-
33748891915
-
-
Matyas, V., Riha, Z., 2002. Biometric authentication-security and usability. Proceedings of the Communications and Multimedia Security Conference. Available at: www.fi.muni.cz/usr/matyas/cms_matyas_riha_biometrics.pdf (Accessed: 2004, July 27).
-
-
-
-
30
-
-
33748885729
-
-
Microsoft, 2003. Secure User Authentication for the Next-generation Secure Computing Base. Available at: www.microsoft.com/resources/ngscb/documents/ngscb_authentication.doc (Accesed: 2004, July, 27).
-
-
-
-
31
-
-
33748895456
-
-
NIST, 2003. Summary of NIST Standards for Biometric Accuracy, Tamper Resistance, and Interoperability. Report to US Congress. Available at: www.itl.nist.gov/iad/894.03/NISTAPP_Nov02.pdf (Accessed: 2004, July 27).
-
-
-
-
32
-
-
33748897263
-
-
Nuance, 2004. Nuance Communications Inc. www.nuance.com
-
-
-
-
33
-
-
85032752153
-
Authentication gets personal with biometrics
-
Ortega-García J., Bigun J., Reynolds D., and González-Rodríguez J. Authentication gets personal with biometrics. IEEE Signal Processing Magazine 21 2 (2004) 50-62
-
(2004)
IEEE Signal Processing Magazine
, vol.21
, Issue.2
, pp. 50-62
-
-
Ortega-García, J.1
Bigun, J.2
Reynolds, D.3
González-Rodríguez, J.4
-
34
-
-
85009060662
-
-
Oviatt, S., 2000. Multimodal interface research: a science without borders. In: Proceedings of the Conference of Spoken Language Processing (ICSLP), vol. 3, pp. 1-6.
-
-
-
-
35
-
-
33748917393
-
-
Patric, A.S., 2004. Usability and acceptability of biometric security systems. Proceedings of the Financial Cryptography Conference (FC04). West FL.
-
-
-
-
36
-
-
0033888070
-
-
Phillips, P.J., Martin, A., Wilson, C.L., Przybocki, M., 2000. An introduction to evaluation biometric systems. IEEE Computer 33 (2), 56-63.
-
-
-
-
37
-
-
33748894101
-
-
Podio, F.L., 2001. Biometrics-Technologies for Highly Secure Personal Authentication. NIST Publications. ITL Bulletin.
-
-
-
-
38
-
-
58149121047
-
-
Poh, N., Bengio, S., Korczak, J., 2002. A multi-sample multi-source model for biometric authentication. IEEE International Workshop on Neural Networks for Signal Processing (NNSP).
-
-
-
-
39
-
-
33748894461
-
-
Precise Biometrics, 2004. Precise Biometrics. www.precisebiometrics.com/
-
-
-
-
41
-
-
33748904693
-
-
Sasse, M.A., 2004. Usability and Trust in Information Systems. Cyber Trust & Crime Prevention Project. University College London.
-
-
-
-
42
-
-
0242303033
-
Using on-line surveys to measure three key constructs of the quality of human-computer interaction in web sites: psychometric properties and implications
-
Schaick P., and Ling J. Using on-line surveys to measure three key constructs of the quality of human-computer interaction in web sites: psychometric properties and implications. International Journal of Human-Computer Studies 59 (2003) 545-567
-
(2003)
International Journal of Human-Computer Studies
, vol.59
, pp. 545-567
-
-
Schaick, P.1
Ling, J.2
-
43
-
-
33748908028
-
-
Scheuermann, D., Schwiderski-Grosche, S., & Struif, B., 2000. Usability of Biometrics in Relation to Electronic Signatures. EU Study 502533/8. GMD-German National Research Center for Information Technology. Institute for Secure Telecooperation (SIT).
-
-
-
-
46
-
-
33748885381
-
-
Seymour, R., Powel, D., 2000. Better Design-The Burglar Alarm. www.designcouncil.info/betterbydesign/security/challenge.html (Accessed: 2004, July 27).
-
-
-
-
47
-
-
0031234789
-
Evaluation of automated biometrics-based identification and verification systems
-
Shen W., Surette M., and Khanna R. Evaluation of automated biometrics-based identification and verification systems. Proceedings of the IEEE 85 9 (1997) 1464-1478
-
(1997)
Proceedings of the IEEE
, vol.85
, Issue.9
, pp. 1464-1478
-
-
Shen, W.1
Surette, M.2
Khanna, R.3
-
48
-
-
33748888708
-
-
SUMI, 2005. Software Usability Measurement Inventory. http://www.ucc.ie/hfrg/questionnaires/sumi/index.html (Accessed: 2005, November 3).
-
-
-
-
49
-
-
33748910372
-
-
Uitenbroek, D.G., 1997. SISA: Simple Interactive Statistical Analysis. Available: home.clara.net/sisa/ (Accessed: 2004, July 14).
-
-
-
-
50
-
-
19944419958
-
-
Vogel, D., Balakrishnan R. Interactive public ambient displays: transitioning from implicit to explicit, public to personal, interaction with multiple users, In: Proceedings ACM UIST 2004.
-
-
-
-
51
-
-
85084161247
-
-
Whitten, A., Tygar, D., 1999. Why Johnny can't encrypt: a usability evaluation of PGP 5.0. Proceedings of the 8th USENIX Security Symposium, Washington DC. Available: www.usenix.org/publications/library/proceedings/sec99/whitten.html (Accessed: 2004, July 27).
-
-
-
-
52
-
-
33748915193
-
-
Zhang, D.D. (Eds.), 2002. Biometric Solutions for Authentication in an E-world. Kluwer, Norwell, MA.
-
-
-
-
54
-
-
84926001904
-
-
Zurko, M.E., Simon, D. (1996). User-centered security. Proceedings of the 1996 Workshop on New Security Paradigms. ACM Press, Lake Arrowhead CA, New York, pp. 27-33.
-
-
-
|