-
1
-
-
0043232732
-
Users are not the enemy
-
Dec
-
A. Adams and M. A. Sasse, "Users are not the enemy," Commun. ACM vol. 42, no. 12, pp. 41-46, Dec. 1999.
-
(1999)
Commun. ACM
, vol.42
, Issue.12
, pp. 41-46
-
-
Adams, A.1
Sasse, M.A.2
-
2
-
-
12844274372
-
Typing patterns: A key to user identification
-
Oct
-
A. Peacock, X. Ke, and M. Wilkerson, "Typing patterns: A key to user identification," IEEE Secur. Privacy Mag., vol. 2, no. 5, pp. 40-47, Oct. 2004.
-
(2004)
IEEE Secur. Privacy Mag
, vol.2
, Issue.5
, pp. 40-47
-
-
Peacock, A.1
Ke, X.2
Wilkerson, M.3
-
3
-
-
33750814617
-
Intelligent technologies for managing fraud and identity theft
-
Apr
-
R. Bose, "Intelligent technologies for managing fraud and identity theft," in Proc. 3rd Int. Conf. Inf. Technol.: NewGenerations, Apr. 2006, pp. 446-451.
-
(2006)
Proc. 3rd Int. Conf. Inf. Technol.: NewGenerations
, pp. 446-451
-
-
Bose, R.1
-
4
-
-
33746176055
-
Biometric authentication systems for credit cards could put identity thieves out of business
-
Jul
-
A. K. Jain and S. Pankanti, "Biometric authentication systems for credit cards could put identity thieves out of business," IEEE Spectr., vol. 43, no. 7, pp. 22-27, Jul. 2006.
-
(2006)
IEEE Spectr
, vol.43
, Issue.7
, pp. 22-27
-
-
Jain, A.K.1
Pankanti, S.2
-
5
-
-
33947621485
-
Keystroke identification based on Gaussian mixture models
-
Toulouse, France, May
-
D. Hosseinzadeh, S. Krishnan, and A. Khademi, "Keystroke identification based on Gaussian mixture models," in Proc. IEEE Int. Conf. Acoust., Speech, Signal Process. (ICASSP), Toulouse, France, vol. 3, May 2006, pp. 1144-1147.
-
(2006)
Proc. IEEE Int. Conf. Acoust., Speech, Signal Process. (ICASSP)
, vol.3
, pp. 1144-1147
-
-
Hosseinzadeh, D.1
Krishnan, S.2
Khademi, A.3
-
6
-
-
12844256823
-
Keyboard apparatus for p ersonal identification
-
R. Spillane, "Keyboard apparatus for p ersonal identification," IBM Tech. Disclosure Bulletin, vol. 17, no. 3346, 1975.
-
(1975)
IBM Tech. Disclosure Bulletin
, vol.17
, Issue.3346
-
-
Spillane, R.1
-
7
-
-
0041108231
-
Dynamic identity verification via keystroke characteristics
-
J. J. Leggett, G. Williams, M. Usnick, and M. Longnecker, "Dynamic identity verification via keystroke characteristics," Int. J. Man-Mach. Stud., vol. 35, no. 6, pp. 859-870, 1991.
-
(1991)
Int. J. Man-Mach. Stud
, vol.35
, Issue.6
, pp. 859-870
-
-
Leggett, J.J.1
Williams, G.2
Usnick, M.3
Longnecker, M.4
-
8
-
-
0343700185
-
-
Rand Corp, Santa Monica, CA, Tech. Rep. R-256-NSF, May
-
R. Gaines, W. Lisowski, S. Press, and N. Shapiro, "Authentication by keystroke timing: Some preliminary results," Rand Corp., Santa Monica, CA, Tech. Rep. R-256-NSF, May 1980.
-
(1980)
Authentication by keystroke timing: Some preliminary results
-
-
Gaines, R.1
Lisowski, W.2
Press, S.3
Shapiro, N.4
-
9
-
-
0025384135
-
Identity authentication based on keystroke latencies
-
Feb
-
R. Joyce and G. Gupta, "Identity authentication based on keystroke latencies," Commun. ACM, vol. 33, no. 2, pp. 168-176, Feb. 1990.
-
(1990)
Commun. ACM
, vol.33
, Issue.2
, pp. 168-176
-
-
Joyce, R.1
Gupta, G.2
-
10
-
-
0022129862
-
Identity verification through keyboard characteristics
-
D. A. Umphress and G.Williams, "Identity verification through keyboard characteristics," Int. J. Man-Mach. Stud., vol. 23, no. 3, pp. 263-273, 1985.
-
(1985)
Int. J. Man-Mach. Stud
, vol.23
, Issue.3
, pp. 263-273
-
-
Umphress, D.A.1
Williams, G.2
-
11
-
-
0023843707
-
Verifying identity via keystroke characteristics
-
J. J. Leggett and G.Williams, "Verifying identity via keystroke characteristics," Int. J. Man-Mach. Stud., vol. 28, no. 1, pp. 67-76, 1988.
-
(1988)
Int. J. Man-Mach. Stud
, vol.28
, Issue.1
, pp. 67-76
-
-
Leggett, J.J.1
Williams, G.2
-
12
-
-
0025541584
-
-
S. Bleha, C. Slivinsky, andB.Hussien, Computer-access security systems using keystroke dynamics, IEEE Trans. Pattern Anal. Mach. Intell. 12, no. 12, pp. 1217-1222, Dec. 1990.
-
S. Bleha, C. Slivinsky, andB.Hussien, "Computer-access security systems using keystroke dynamics," IEEE Trans. Pattern Anal. Mach. Intell. vol. 12, no. 12, pp. 1217-1222, Dec. 1990.
-
-
-
-
13
-
-
13244284703
-
User authentication through typing biometrics features
-
Feb
-
L. C. F. Araújo, L. H. R. Sucupira, M. G. Lizárraga, L. L. Ling, and J. B. T. Yabu-Uti, "User authentication through typing biometrics features," IEEE Trans. Signal Process., vol. 53, no. 2, pp. 851-855, Feb. 2005.
-
(2005)
IEEE Trans. Signal Process
, vol.53
, Issue.2
, pp. 851-855
-
-
Araújo, L.C.F.1
Sucupira, L.H.R.2
Lizárraga, M.G.3
Ling, L.L.4
Yabu-Uti, J.B.T.5
-
14
-
-
0347560656
-
The basis of transcription skill
-
L. H. Shaffer and J. Hardwick, "The basis of transcription skill," J. Exp. Psychol., vol. 84, no. 3, pp. 424-440, 1970.
-
(1970)
J. Exp. Psychol
, vol.84
, Issue.3
, pp. 424-440
-
-
Shaffer, L.H.1
Hardwick, J.2
-
15
-
-
56049111829
-
Latency Experiments in Transcription
-
S. Kornblum, Ed. New York: Academic
-
L. H. Shaffer, Latency Experiments in Transcription (ser. Attention and Performance), vol. 4, S. Kornblum, Ed. New York: Academic, 1973.
-
(1973)
ser. Attention and Performance
, vol.4
-
-
Shaffer, L.H.1
-
16
-
-
0040534362
-
A model for subjective grouping in typewriting
-
E. Thomas and R. Jones, "A model for subjective grouping in typewriting," Q. J. Exp. Psychol., vol. 22, pp. 354-367, 1970.
-
(1970)
Q. J. Exp. Psychol
, vol.22
, pp. 354-367
-
-
Thomas, E.1
Jones, R.2
-
17
-
-
0005322028
-
-
D. Mahar, R. Napier,M.Wagner,W. Laverty, R. Henderson, andM.Hiron, Optimizing digraph-latency based biometric typist verification systems: Inter and intra typist differences in digraph latency distributions, Int. J. Human-Comput. Stud., 43, no. 4, pp. 579-592, 1995.
-
D. Mahar, R. Napier,M.Wagner,W. Laverty, R. Henderson, andM.Hiron, "Optimizing digraph-latency based biometric typist verification systems: Inter and intra typist differences in digraph latency distributions," Int. J. Human-Comput. Stud., vol. 43, no. 4, pp. 579-592, 1995.
-
-
-
-
18
-
-
56049086814
-
-
A. J. Mansfield and J. L.Wayman, Best practices in testing and reporting performance of biometric devices, Centre Math. Sci. Comput., Nat. Phys. Laboratory, U.K., Tech. Rep. NPL CMSC 14/02, Aug. 2002.
-
A. J. Mansfield and J. L.Wayman, "Best practices in testing and reporting performance of biometric devices," Centre Math. Sci. Comput., Nat. Phys. Laboratory, U.K., Tech. Rep. NPL CMSC 14/02, Aug. 2002.
-
-
-
-
19
-
-
0034140431
-
Keystroke dynamics as a biometric for authentication
-
Feb
-
F. Monrose and A. Rubin, "Keystroke dynamics as a biometric for authentication," Future Generation Comput. Syst. (FGCS), vol. 16, no. 4, pp. 351-359, Feb. 2000.
-
(2000)
Future Generation Comput. Syst. (FGCS)
, vol.16
, Issue.4
, pp. 351-359
-
-
Monrose, F.1
Rubin, A.2
-
20
-
-
0030721345
-
Computer-access authentication with neural network based keystroke identity verification
-
Jun
-
D.-T. Lin, "Computer-access authentication with neural network based keystroke identity verification," in Proc. IEEE Int. Conf. Neural Netw. vol. 1, Jun. 1997, pp. 174-178.
-
(1997)
Proc. IEEE Int. Conf. Neural Netw
, vol.1
, pp. 174-178
-
-
Lin, D.-T.1
-
21
-
-
0031121887
-
Verification of computer users using keystroke dynamics
-
Apr
-
M. Obaidat and B. Sadoun, "Verification of computer users using keystroke dynamics," IEEE Trans. Syst., Man Cybern. - Part B: Cybern., vol. 27, no. 2, pp. 261-269, Apr. 1997.
-
(1997)
IEEE Trans. Syst., Man Cybern. - Part B: Cybern
, vol.27
, Issue.2
, pp. 261-269
-
-
Obaidat, M.1
Sadoun, B.2
-
22
-
-
0039921279
-
User identification via keystroke characteristics of typed names using neural networks
-
Dec
-
M. Brown and S. J. Rogers, "User identification via keystroke characteristics of typed names using neural networks," Int. J. Man-Mach. Stud., vol. 39, no. 6, pp. 999-1014, Dec. 1993.
-
(1993)
Int. J. Man-Mach. Stud
, vol.39
, Issue.6
, pp. 999-1014
-
-
Brown, M.1
Rogers, S.J.2
-
23
-
-
0141522840
-
GA-SVM wrapper approach for feature subset selection in keystroke dynamics identity verification
-
Jul
-
E.Yu and S.Cho, "GA-SVM wrapper approach for feature subset selection in keystroke dynamics identity verification," in Proc. IEEE Int. Joint Conf. Neural Netw., Jul. 2003, pp. 2253-2257.
-
(2003)
Proc. IEEE Int. Joint Conf. Neural Netw
, pp. 2253-2257
-
-
Yu, E.1
Cho, S.2
-
24
-
-
16244403658
-
Applying hidden Markov models to keystroke pattern analysis for password verification
-
Nov
-
W. Chen and W. Chang, "Applying hidden Markov models to keystroke pattern analysis for password verification," in Proc. IEEE Int. Conf. Inform. Reuse Integr. (IRI), Nov. 2004, pp. 467-474.
-
(2004)
Proc. IEEE Int. Conf. Inform. Reuse Integr. (IRI)
, pp. 467-474
-
-
Chen, W.1
Chang, W.2
-
25
-
-
33745728505
-
Improving hidden Markov models with a similarity histogram for typing pattern biometrics
-
Aug
-
W. Chang, "Improving hidden Markov models with a similarity histogram for typing pattern biometrics," in Proc. IEEE Int. Conf. Inf. Reuse Integr. (IRI), Aug. 2005, pp. 487-493.
-
(2005)
Proc. IEEE Int. Conf. Inf. Reuse Integr. (IRI)
, pp. 487-493
-
-
Chang, W.1
-
26
-
-
14244251045
-
Deterring password sharing: User authentication via fuzzy c-means clustering applied to keystroke biometric data
-
S. Mandujano and R. Soto, "Deterring password sharing: User authentication via fuzzy c-means clustering applied to keystroke biometric data," in Proc. 5th Mexican Int. Conf. Comput. Sci. (ECN'04), pp. 181-187.
-
Proc. 5th Mexican Int. Conf. Comput. Sci. (ECN'04)
, pp. 181-187
-
-
Mandujano, S.1
Soto, R.2
-
27
-
-
0033362256
-
Biometric identification system based on keyboard filtering
-
Madrid, Spain, Oct
-
O. Coltell, J. M. Dabia, and G. Torres, "Biometric identification system based on keyboard filtering," in Proc. IEEE 33rd Annu. Int. Carnahan Conf. Security Technol., Madrid, Spain, Oct.1999, pp. 203-209.
-
(1999)
Proc. IEEE 33rd Annu. Int. Carnahan Conf. Security Technol
, pp. 203-209
-
-
Coltell, O.1
Dabia, J.M.2
Torres, G.3
-
28
-
-
33847164140
-
Password secured sites ' U - Stepping forward with keystroke dynamics
-
Aug
-
S. T. de Magalhães, K. Revett, and H. M. D. Santos, "Password secured sites ' U - Stepping forward with keystroke dynamics," in Proc. IEEE Int. Conf. Next Generation Web Serv. Practices, Aug. 2005, pp. 224-229.
-
(2005)
Proc. IEEE Int. Conf. Next Generation Web Serv. Practices
, pp. 224-229
-
-
de Magalhães, S.T.1
Revett, K.2
Santos, H.M.D.3
-
31
-
-
33750950105
-
Fusion of methods for keystroke dynamic authentication
-
Oct
-
S. Hocquet, J.-Y. Ramel, and H. Cardot, "Fusion of methods for keystroke dynamic authentication," in Proc. IEEE Workshop Autom. Identification Adv. Technol., Oct. 2005, pp. 224-229.
-
(2005)
Proc. IEEE Workshop Autom. Identification Adv. Technol
, pp. 224-229
-
-
Hocquet, S.1
Ramel, J.-Y.2
Cardot, H.3
-
32
-
-
0033738539
-
The nist speaker recognition evaluation - Overview, methodology, systems, results, perspectives
-
Jun
-
G. R. Doddington, M. A. Przybocki, A. F. Martin, and D. A. Reynolds, "The nist speaker recognition evaluation - Overview, methodology, systems, results, perspectives," Speech Commun., vol. 31, no. 2-3, pp. 225-254, Jun. 2000.
-
(2000)
Speech Commun
, vol.31
, Issue.2-3
, pp. 225-254
-
-
Doddington, G.R.1
Przybocki, M.A.2
Martin, A.F.3
Reynolds, D.A.4
-
33
-
-
0002629270
-
Maximum likelihood from incomplete data via the EM algorithm
-
A. Dempster, N. Laird, and D. Rubin, "Maximum likelihood from incomplete data via the EM algorithm," J. R. Stat. Soc. Series B (Methodol.), vol. 39, no. 1, pp. 1-38, 1977.
-
(1977)
J. R. Stat. Soc. Series B (Methodol.)
, vol.39
, Issue.1
, pp. 1-38
-
-
Dempster, A.1
Laird, N.2
Rubin, D.3
-
34
-
-
0029209272
-
Robust text-independent speaker identification using Gaussian mixture speaker models
-
Jan
-
D. A. Reynolds and R. C. Rose, "Robust text-independent speaker identification using Gaussian mixture speaker models," IEEE Trans. Speech Audio Process., vol. 3, no. 1, pp. 72-83, Jan. 1995.
-
(1995)
IEEE Trans. Speech Audio Process
, vol.3
, Issue.1
, pp. 72-83
-
-
Reynolds, D.A.1
Rose, R.C.2
-
35
-
-
0001091769
-
Automatic speaker recognition using gaussian mixture speaker models
-
D. A. Reynolds, "Automatic speaker recognition using gaussian mixture speaker models," Lincoln Lab. J., vol. 8, no. 2, pp. 173-192, 1995.
-
(1995)
Lincoln Lab. J
, vol.8
, Issue.2
, pp. 173-192
-
-
Reynolds, D.A.1
-
38
-
-
84894355098
-
Selecting the optimal number of components for a Gaussian mixture model
-
Jun
-
P. McKenzie andM. Alder, "Selecting the optimal number of components for a Gaussian mixture model," in Proc. IEEE Int. Symp. Inf. Theory Jun. 1994, p. 393.
-
(1994)
Proc. IEEE Int. Symp. Inf. Theory
, pp. 393
-
-
McKenzie andM, P.1
Alder2
|