-
3
-
-
33947614547
-
-
K. Cartwright, Information Sources and Metrics, Proc. KBA Symp. - Knowledge Based Authentication: Is It Quantifiable? 2004.
-
K. Cartwright, "Information Sources and Metrics," Proc. KBA Symp. - Knowledge Based Authentication: Is It Quantifiable? 2004.
-
-
-
-
4
-
-
33947651500
-
-
Uniting and Strengthening America by Providing Appropriate Tools Required to Intercept and Obstruct Terrorism (USA PATRIOT) Act of 2001, 107th US Congress, First Session, HR 3162 Public Law 107-45, Oct. 2001.
-
Uniting and Strengthening America by Providing Appropriate Tools Required to Intercept and Obstruct Terrorism (USA PATRIOT) Act of 2001, 107th US Congress, First Session, HR 3162 Public Law 107-45, Oct. 2001.
-
-
-
-
5
-
-
33947669259
-
-
S. Howard, Knowledge Based Authentication and Privacy: Can Standards Help, Proc. KBA Symp. - Knowledge Based Authentication: Is It Quantifiable? 2004.
-
S. Howard, "Knowledge Based Authentication and Privacy: Can Standards Help," Proc. KBA Symp. - Knowledge Based Authentication: Is It Quantifiable? 2004.
-
-
-
-
6
-
-
27544477471
-
-
Nat'l Inst. of Standards and Technology NIST, NIST Special Publication 800-63, version 1.0.2
-
W.E. Burr, D.F. Dodson, and W.T. Polk, "Electronic Authentication Guideline: Recommendations of the National Institute of Standards and Technology," Nat'l Inst. of Standards and Technology (NIST), NIST Special Publication 800-63, version 1.0.2, 2006.
-
(2006)
Electronic Authentication Guideline: Recommendations of the National Institute of Standards and Technology
-
-
Burr, W.E.1
Dodson, D.F.2
Polk, W.T.3
-
7
-
-
33947691113
-
-
S. Chokhani, Knowledge Based Authentication (KBA) Metrics, Proc. KBA Symp. - Knowledge Based Authentication: Is It Quantifiable? 2004.
-
S. Chokhani, "Knowledge Based Authentication (KBA) Metrics," Proc. KBA Symp. - Knowledge Based Authentication: Is It Quantifiable? 2004.
-
-
-
-
8
-
-
33947704016
-
-
B. Lawler, Models of Knowledge Based Authentication (KBA), Proc. KBA Symp. - Knowledge Based Authentication: Is It Quantifiable? 2004.
-
B. Lawler, "Models of Knowledge Based Authentication (KBA)," Proc. KBA Symp. - Knowledge Based Authentication: Is It Quantifiable? 2004.
-
-
-
-
9
-
-
0043232732
-
Users Are Not the Enemy
-
A. Adams and M.A. Sasse, "Users Are Not the Enemy," Comm. ACM, vol. 42, no. 12, pp. 40-46, 1999.
-
(1999)
Comm. ACM
, vol.42
, Issue.12
, pp. 40-46
-
-
Adams, A.1
Sasse, M.A.2
-
10
-
-
33947626972
-
-
K. Trilli and B. Andrews, KBA Challenge Response System, Proc. KBA Symp. - Knowledge Based Authentication: Is It Quantifiable? 2004.
-
K. Trilli and B. Andrews, "KBA Challenge Response System," Proc. KBA Symp. - Knowledge Based Authentication: Is It Quantifiable? 2004.
-
-
-
-
11
-
-
33947702984
-
-
Entrust IdentityGuard - User Authentication Methods, Entrust, May 2006, http://www.entrust.com/strong-authentication/user-authentication/ methods.htm.
-
"Entrust IdentityGuard - User Authentication Methods," Entrust, May 2006, http://www.entrust.com/strong-authentication/user-authentication/ methods.htm.
-
-
-
-
12
-
-
33947636496
-
-
Identity Verification and Authentication Solutions, Verid®, May 2006, http://www.verid.com/authentication.html.
-
"Identity Verification and Authentication Solutions," Verid®, May 2006, http://www.verid.com/authentication.html.
-
-
-
-
13
-
-
33947705064
-
-
May
-
"VerifyU™," UW Credit Union, May 2006, http://www.uwcu.org/products/webbranch/VerifyU.asp.
-
(2006)
UW Credit Union
-
-
VerifyU™1
-
14
-
-
78049444778
-
Future Directions in User Authentication
-
B. Kaliski, "Future Directions in User Authentication," Proc. IT-DEFENSE '05, 2005.
-
(2005)
Proc. IT-DEFENSE '05
-
-
Kaliski, B.1
-
15
-
-
33947666497
-
Identity Fraud: Providing a Solution
-
white paper, LexisNexis
-
N.A. Willox and T.M. Regan, "Identity Fraud: Providing a Solution," white paper, LexisNexis, 2002, http://www.lexisnexis.com/about/ whitepaper/IdentityFraud.pdf.
-
(2002)
-
-
Willox, N.A.1
Regan, T.M.2
-
16
-
-
33947711624
-
-
W. Burr, NIST E-Authentication Guidance: Can We Add KBA, Proc. KBA Symp. - Knowledge Based Authentication: Is It Quantifiable? 2004.
-
W. Burr, "NIST E-Authentication Guidance: Can We Add KBA," Proc. KBA Symp. - Knowledge Based Authentication: Is It Quantifiable? 2004.
-
-
-
-
17
-
-
84856043672
-
A Mathematical Theory of Communication
-
July
-
C.E. Shannon, "A Mathematical Theory of Communication," Bell System Technical J., vol. 27, pp. 379-423, July 1948, http://cm.bell-labs. com/cm/ms/what/shannonday/paper.html.
-
(1948)
Bell System Technical J
, vol.27
, pp. 379-423
-
-
Shannon, C.E.1
-
18
-
-
0004013982
-
Entropy Measures and Unconditional Security in Cryptography
-
U. Maurer, ed, Hartung-Gorre Verlag
-
C. Cachin, "Entropy Measures and Unconditional Security in Cryptography," ETH Series in Information Security and Cryptography, U. Maurer, ed., vol. 1, Hartung-Gorre Verlag, 1997, http://www.zurich.ibm.com/ ~cca/papers/diss.ps.gz.
-
(1997)
ETH Series in Information Security and Cryptography
, vol.1
-
-
Cachin, C.1
-
19
-
-
84944486544
-
Prediction and Entropy of Printed English
-
C.E. Shannon, "Prediction and Entropy of Printed English," Bell System Technical J., vol. 30, no. 1, pp. 50-64, 1951.
-
(1951)
Bell System Technical J
, vol.30
, Issue.1
, pp. 50-64
-
-
Shannon, C.E.1
-
20
-
-
33947642991
-
The Authentication Scorecard
-
white paper, RSA Security
-
"The Authentication Scorecard," white paper, RSA Security, 2004, http://www.rsasecurity.com/products/securid/whitepapers/ASC_WP_0904.pdf.
-
(2004)
-
-
-
21
-
-
33947703498
-
Are You Sharing Too Much?
-
K. Murphy, "Are You Sharing Too Much?" Vantage Magazine, voL 2, no. 2, 2005.
-
(2005)
Vantage Magazine
, vol.2
, Issue.2
-
-
Murphy, K.1
-
22
-
-
33947657772
-
Safety and Security Tips: Buying and Selling on Amazon.com
-
"Safety and Security Tips: Buying and Selling on Amazon.com," http://www.amazon.com/exec/obidos/tg/browse/-/10412241/ref=br_bx_c_1_2/ 104-9237732-6319118. May 2006.
-
(2006)
-
-
-
23
-
-
33947674588
-
Managing Your eBay Member Account If You Forgot Your Password
-
May
-
"Managing Your eBay Member Account If You Forgot Your Password," http://pages.ebay.com/help/account/password.html, May 2006.
-
(2006)
-
-
-
26
-
-
84976362631
-
Real-World Applications of Bayesian Networks
-
D. Heckerman, A. Mamdani, and M.P. Wellman, "Real-World Applications of Bayesian Networks," Comm. ACM, vol. 38, no. 3, pp. 24-26, 1995.
-
(1995)
Comm. ACM
, vol.38
, Issue.3
, pp. 24-26
-
-
Heckerman, D.1
Mamdani, A.2
Wellman, M.P.3
-
27
-
-
85008015613
-
Building Probabilistic Networks: Where Do the Numbers Come From? Guest Editors' Introduction
-
July/Aug
-
M.J. Druzdzel and L.C. van der Gaag, "Building Probabilistic Networks: Where Do the Numbers Come From? Guest Editors' Introduction," IEEE Trans. Knowledge and Data Eng., vol. 12, no. 4, pp. 481-486, July/Aug. 2000.
-
(2000)
IEEE Trans. Knowledge and Data Eng
, vol.12
, Issue.4
, pp. 481-486
-
-
Druzdzel, M.J.1
van der Gaag, L.C.2
-
28
-
-
0034215972
-
Constructing Bayesian Networks for Medical Diagnosis from Incomplete and Partially Correct Statistics
-
July/Aug
-
D. Nikovski, "Constructing Bayesian Networks for Medical Diagnosis from Incomplete and Partially Correct Statistics," IEEE Trans. Knowledge and Data Eng., vol. 12, no. 4, pp. 509-516, July/Aug. 2000.
-
(2000)
IEEE Trans. Knowledge and Data Eng
, vol.12
, Issue.4
, pp. 509-516
-
-
Nikovski, D.1
-
29
-
-
3042636507
-
A Case Study of Applying Boosting Naïve Bayes to Claim Fraud Diagnosis
-
May
-
S. Viaene, R.A. Derrig, and G. Dedene, "A Case Study of Applying Boosting Naïve Bayes to Claim Fraud Diagnosis," IEEE Trans. and Knowledge Data Eng., vol. 16, no. 5, pp. 612-620, May 2004.
-
(2004)
IEEE Trans. and Knowledge Data Eng
, vol.16
, Issue.5
, pp. 612-620
-
-
Viaene, S.1
Derrig, R.A.2
Dedene, G.3
-
30
-
-
0036088611
-
Analysis of Distributed Intrusion Detection Systems Using Bayesian Methods
-
D.J. Burroughs, L.F. Wilson, and G.V. Cybenko, "Analysis of Distributed Intrusion Detection Systems Using Bayesian Methods," Proc. 21st IEEE Int'l Performance, Computing, and Comm. Conf. (IPCCC '02), pp. 329-334, 2002.
-
(2002)
Proc. 21st IEEE Int'l Performance, Computing, and Comm. Conf. (IPCCC '02)
, pp. 329-334
-
-
Burroughs, D.J.1
Wilson, L.F.2
Cybenko, G.V.3
-
32
-
-
0031276011
-
Bayesian Network Classifiers
-
N. Friedman, D. Geiger, and M. Goldszmidt, "Bayesian Network Classifiers," Machine Learning, vol. 29, no. 2, pp. 131-163, 1997.
-
(1997)
Machine Learning
, vol.29
, Issue.2
, pp. 131-163
-
-
Friedman, N.1
Geiger, D.2
Goldszmidt, M.3
-
33
-
-
0002652285
-
A Maximum Entropy Approach to Natural Language Processing
-
A. Berger, S.D. Pietra, and V.D. Pietra, "A Maximum Entropy Approach to Natural Language Processing," Computational Linguistics, vol. 22, no. 1, pp. 39-71, 1996.
-
(1996)
Computational Linguistics
, vol.22
, Issue.1
, pp. 39-71
-
-
Berger, A.1
Pietra, S.D.2
Pietra, V.D.3
-
34
-
-
0030181951
-
A Maximum Entropy Approach to Adaptive Statistical Language Modeling
-
R. Rosenfeld, "A Maximum Entropy Approach to Adaptive Statistical Language Modeling," Computer Speech and Language, vol. 10, no. 3, pp. 187-228, 1996.
-
(1996)
Computer Speech and Language
, vol.10
, Issue.3
, pp. 187-228
-
-
Rosenfeld, R.1
-
35
-
-
12844275960
-
Password Memorability and Security: Empirical Results
-
Sept./Oct
-
J. Yan, A. Blackwell, R. Anderson, and A. Grant, "Password Memorability and Security: Empirical Results," IEEE Security and Privacy, vol. 2, no. 5, pp. 25-31, Sept./Oct. 2004.
-
(2004)
IEEE Security and Privacy
, vol.2
, Issue.5
, pp. 25-31
-
-
Yan, J.1
Blackwell, A.2
Anderson, R.3
Grant, A.4
-
36
-
-
0003369812
-
A Comparison of Password Techniques for Multilevel Authentication Mechanisms
-
M. Zviran and W.J. Haga, "A Comparison of Password Techniques for Multilevel Authentication Mechanisms," The Computer J., vol. 36, no. 3, pp. 227-237, 1993.
-
(1993)
The Computer J
, vol.36
, Issue.3
, pp. 227-237
-
-
Zviran, M.1
Haga, W.J.2
-
37
-
-
0141607834
-
The Representational Power of Discrete Bayesian Networks
-
C.X. Ling and H. Zhang, "The Representational Power of Discrete Bayesian Networks," J. Machine Learning Research, vol. 3, pp. 709-721, 2003.
-
(2003)
J. Machine Learning Research
, vol.3
, pp. 709-721
-
-
Ling, C.X.1
Zhang, H.2
-
40
-
-
0001927585
-
On Information and Sufficiency
-
S. Kullback and R.A. Leibler, "On Information and Sufficiency," The Annals of Math. Statistics, vol. 22, no. 1, pp. 79-86, 1951.
-
(1951)
The Annals of Math. Statistics
, vol.22
, Issue.1
, pp. 79-86
-
-
Kullback, S.1
Leibler, R.A.2
-
44
-
-
84894038661
-
Using Voice to Generate Cryptographic Keys
-
F. Monrose, M.K. Reiter, Q. Li, and S. Wetzel, "Using Voice to Generate Cryptographic Keys," Proc. Odyssey 2001, the Speaker Recognition Workshop, 2001.
-
(2001)
Proc. Odyssey 2001, the Speaker Recognition Workshop
-
-
Monrose, F.1
Reiter, M.K.2
Li, Q.3
Wetzel, S.4
-
45
-
-
0012356427
-
Perplexity - A Measure of Difficulty of Speech Recognition Tasks
-
Dec
-
F. Jelinek, R.L. Mercer, L.R. Bahl, and J.K. Baker, "Perplexity - A Measure of Difficulty of Speech Recognition Tasks," Proc. 94th Meeting of the Acoustic Soc. Am., Dec. 1977.
-
(1977)
Proc. 94th Meeting of the Acoustic Soc. Am
-
-
Jelinek, F.1
Mercer, R.L.2
Bahl, L.R.3
Baker, J.K.4
-
47
-
-
21244466146
-
Zur Theorie der Gesellschaftsspiele
-
J. von Neumann, "Zur Theorie der Gesellschaftsspiele," Mathematische Annalen, vol. 100, no. 1, pp. 295-320, 1928.
-
(1928)
Mathematische Annalen
, vol.100
, Issue.1
, pp. 295-320
-
-
von Neumann, J.1
-
48
-
-
0002021736
-
Equilibrium Points in N-Person Garnes
-
J.F. Nash, "Equilibrium Points in N-Person Garnes," Proc. Nat'l Academy of Sciences of the USA, vol. 36, no. 1, pp. 48-19, 1950.
-
(1950)
Proc. Nat'l Academy of Sciences of the USA
, vol.36
, Issue.1
, pp. 48-19
-
-
Nash, J.F.1
-
49
-
-
3042824043
-
A Study of Smoothing Methods for Language Models Applied to Information Retrieval
-
C. Zhai and J. Lafferty, "A Study of Smoothing Methods for Language Models Applied to Information Retrieval," ACM Trans. Information Systems (TOIS), vol. 22, no. 2, pp. 179-214, 2004
-
(2004)
ACM Trans. Information Systems (TOIS)
, vol.22
, Issue.2
, pp. 179-214
-
-
Zhai, C.1
Lafferty, J.2
-
50
-
-
0003860037
-
-
W.R. Gilks, S. Richardson, and D.J. Spiegelhalter, eds. Chapman & Hall/CRC
-
Markov Chain Monte Carlo in Practice, W.R. Gilks, S. Richardson, and D.J. Spiegelhalter, eds. Chapman & Hall/CRC, 1996.
-
(1996)
Markov Chain Monte Carlo in Practice
-
-
-
51
-
-
0021518209
-
Stochastic Relaxation, Gibbs Distributions, and the Bayesian Restoration of Images
-
S. Geman and D. Geman, "Stochastic Relaxation, Gibbs Distributions, and the Bayesian Restoration of Images," IEEE Trans. Pattern Analysis and Machine Intelligence, vol. 6, no. 6, pp. 721-741, 1984.
-
(1984)
IEEE Trans. Pattern Analysis and Machine Intelligence
, vol.6
, Issue.6
, pp. 721-741
-
-
Geman, S.1
Geman, D.2
-
53
-
-
33947615021
-
SMILE (Structural Modeling, Inference, and Learning Engine)
-
Decision Systems Laboratory, Univ. of Pittsburgh, June
-
"SMILE (Structural Modeling, Inference, and Learning Engine)," Decision Systems Laboratory, Univ. of Pittsburgh, June 2006, http://genie.sis.pitt.edu.
-
(2006)
-
-
-
54
-
-
0033901049
-
On the Determination of Subjective Probability by Choices
-
E. Karni and P. Mongin, "On the Determination of Subjective Probability by Choices," Management Science, vol. 46, no. 2, pp. 233-248, 2000.
-
(2000)
Management Science
, vol.46
, Issue.2
, pp. 233-248
-
-
Karni, E.1
Mongin, P.2
-
55
-
-
25844499944
-
Subjective Probability Assessment in Decision Analysis: Partition Dependence and Bias toward the Ignorance Prior
-
C.R. Fox and R.T. Clemen, "Subjective Probability Assessment in Decision Analysis: Partition Dependence and Bias toward the Ignorance Prior," Management Science, vol. 51, no. 9, pp. 1417-1432, 2005.
-
(2005)
Management Science
, vol.51
, Issue.9
, pp. 1417-1432
-
-
Fox, C.R.1
Clemen, R.T.2
-
56
-
-
0002843594
-
The Consensus of Subjective Probability Distributions
-
R.L. Winkler, "The Consensus of Subjective Probability Distributions," Management Science, vol. 15, no. 2, pp. 61-75, 1968.
-
(1968)
Management Science
, vol.15
, Issue.2
, pp. 61-75
-
-
Winkler, R.L.1
-
57
-
-
0010298686
-
Subjective Probability and the Theory of Games
-
J.B. Kadane and P.D. Larkey, "Subjective Probability and the Theory of Games," Management Science, vol. 28, no. 2, pp. 113-120, 1982.
-
(1982)
Management Science
, vol.28
, Issue.2
, pp. 113-120
-
-
Kadane, J.B.1
Larkey, P.D.2
-
58
-
-
11844297349
-
Games with Incomplete Information Played by 'Bayesian' Players, III
-
J.C. Harsanyi, "Games with Incomplete Information Played by 'Bayesian' Players, III," Management Science, vol. 50, no. 12 supplement, pp. 1804-1817, 2004.
-
(2004)
Management Science
, vol.50
, Issue.12 SUPPL.EMENT
, pp. 1804-1817
-
-
Harsanyi, J.C.1
|