메뉴 건너뛰기




Volumn 26, Issue 7-8, 2007, Pages 468-478

A non-intrusive biometric authentication mechanism utilising physiological characteristics of the human head

Author keywords

Authentication; Biometrics; Head; Non intrusive; Physiology

Indexed keywords

ACOUSTIC WAVES; BIOMETRICS; HUMAN COMPUTER INTERACTION; PHYSIOLOGY; STATISTICAL METHODS; USER INTERFACES;

EID: 36549062966     PISSN: 01674048     EISSN: None     Source Type: Journal    
DOI: 10.1016/j.cose.2007.10.001     Document Type: Article
Times cited : (15)

References (12)
  • 3
    • 84902520904 scopus 로고    scopus 로고
    • A long-term trial of keystroke profiling using digraph, trigraph and keyword latencies
    • Deswarte Y., et al. (Ed)
    • Dowland P.S., and Furnell S.M. A long-term trial of keystroke profiling using digraph, trigraph and keyword latencies. In: Deswarte Y., et al. (Ed). Security and protection in information processing systems (2004) 275-289
    • (2004) Security and protection in information processing systems , pp. 275-289
    • Dowland, P.S.1    Furnell, S.M.2
  • 4
    • 33748440435 scopus 로고    scopus 로고
    • Security mobile devices: technology and attitude
    • Furnell S. Security mobile devices: technology and attitude. Network Secur (August 2006) 9-13
    • (2006) Network Secur , pp. 9-13
    • Furnell, S.1
  • 6
    • 24144495069 scopus 로고    scopus 로고
    • International Biometric Group (IBG). Available from: [accessed May 2006]
    • International Biometric Group (IBG). How is 'Biometrics' defined?. Available from: (2006). [accessed May 2006]
    • (2006) How is 'Biometrics' defined?
  • 7
    • 36549074367 scopus 로고    scopus 로고
    • Klein D. Foiling the cracker: a survey of, and improvements to, password security. In: Proceedings of the Second USENIX Security Workshop, Portland, Oregon; August 1990. p. 5-14.
  • 9
    • 0018543411 scopus 로고
    • Password security: a case history
    • Morris R., and Thompson K. Password security: a case history. Commun ACM 22 11 (1979) 594-597
    • (1979) Commun ACM , vol.22 , Issue.11 , pp. 594-597
    • Morris, R.1    Thompson, K.2
  • 10
    • 36548999559 scopus 로고    scopus 로고
    • Rodwell P. Non-intrusive subscriber authentication for next generation mobile communications systems. PhD thesis, University of Plymouth; 2006.
  • 11
    • 0035387175 scopus 로고    scopus 로고
    • Transforming the "weakest link": a human-computer interaction approach to usable and effective security
    • Sasse M.A., Brostoff S., and Weirich D. Transforming the "weakest link": a human-computer interaction approach to usable and effective security. BT Technol J 19 3 (2001) 122-131
    • (2001) BT Technol J , vol.19 , Issue.3 , pp. 122-131
    • Sasse, M.A.1    Brostoff, S.2    Weirich, D.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.