-
1
-
-
0042585206
-
Keystroke Dynamics Based Authentication
-
Anil Jain et al Editors, pp, Kluwer, MA
-
M. S. Obaidat, and B.Sadoun, "Keystroke Dynamics Based Authentication" in Biometrics: Personal Identification in Networked Society, Anil Jain et al (Editors), pp. 213-229, Kluwer, MA, 1999.
-
(1999)
Biometrics: Personal Identification in Networked Society
, pp. 213-229
-
-
Obaidat, M.S.1
Sadoun, B.2
-
2
-
-
0141868898
-
Authentication by keystroke timing: Some preliminary results
-
NSF. Rand Corporation, Santa Monica, CA
-
R. Gaines, W. Lisowski, S. Press, and N. Shapiro, "Authentication by keystroke timing: Some preliminary results", The Rand Report R-256- NSF. Rand Corporation, Santa Monica, CA, 1980.
-
(1980)
The Rand Report
-
-
Gaines, R.1
Lisowski, W.2
Press, S.3
Shapiro, N.4
-
3
-
-
0022129862
-
Identity verification through keyboard Characteristics
-
Sept
-
D. Umphress, and G. Williams, "Identity verification through keyboard Characteristics", Int. J. Man-Machine Studies, vol. 23, no. 3, pp. 263-273, Sept. 1985.
-
(1985)
Int. J. Man-Machine Studies
, vol.23
, Issue.3
, pp. 263-273
-
-
Umphress, D.1
Williams, G.2
-
4
-
-
0025384135
-
Identity authorization based on keystroke latencies
-
Feb
-
R. Joyce, G. Gupta, "Identity authorization based on keystroke latencies", Commun. ACM, vol. 33, no. 2, pp. 168-176, Feb, 1990.
-
(1990)
Commun. ACM
, vol.33
, Issue.2
, pp. 168-176
-
-
Joyce, R.1
Gupta, G.2
-
5
-
-
0027602443
-
Computer User Verification Using the Perceptron
-
May/June
-
S. Bleha and M.S. Obaidat, "Computer User Verification Using the Perceptron", IEEE Trans. Systems, Man, and Cybernetics, vol. 23, no. 3, pp. 900-902, May/June, 1993.
-
(1993)
IEEE Trans. Systems, Man, and Cybernetics
, vol.23
, Issue.3
, pp. 900-902
-
-
Bleha, S.1
Obaidat, M.S.2
-
6
-
-
0005327658
-
Web-based keystroke dynamics identity verification using neural network
-
S. Cho, C. Han, D. Han, and H. Kim, "Web-based keystroke dynamics identity verification using neural network", Journal of organizational computing and electronic commerce vol. 10, no.4, pp.295-307, 2000.
-
(2000)
Journal of organizational computing and electronic commerce
, vol.10
, Issue.4
, pp. 295-307
-
-
Cho, S.1
Han, C.2
Han, D.3
Kim, H.4
-
7
-
-
0005237994
-
User authentication for keypad-based devices using keystroke analysis
-
Plymouth, UK
-
T. Ord and S. M. Furnell. "User authentication for keypad-based devices using keystroke analysis". In Second International Network Conference, Plymouth, UK, 2000.
-
(2000)
Second International Network Conference
-
-
Ord, T.1
Furnell, S.M.2
-
8
-
-
24644438726
-
A parallel decision tree-based method for user authentication based on keystroke patterns
-
Yong Sheng, V. V. Phoha, S. M. Rovnyak, "A parallel decision tree-based method for user authentication based on keystroke patterns". IEEE Transactions on Systems, Man, and Cybernetics, vol. 35, no. 4, pp.826-833, 2005.
-
(2005)
IEEE Transactions on Systems, Man, and Cybernetics
, vol.35
, Issue.4
, pp. 826-833
-
-
Yong Sheng, V.1
Phoha, V.2
Rovnyak, S.M.3
-
9
-
-
33744965791
-
-
Ricardo N. Rodrigues, Glauco F. G. Yared, Carlos R. do N. Costa, João Baptista T. Yabu-Uti, Fábio Violaro, Lee Luan Ling: Biometric Access Control Through Numerical Keyboards Based on Keystroke Dynamics, D. Zhang and A.K. Jain (Editors), ICB 2006, LNCS 3832, pp.640-646, 2005.
-
Ricardo N. Rodrigues, Glauco F. G. Yared, Carlos R. do N. Costa, João Baptista T. Yabu-Uti, Fábio Violaro, Lee Luan Ling: "Biometric Access Control Through Numerical Keyboards Based on Keystroke Dynamics", D. Zhang and A.K. Jain (Editors), ICB 2006, LNCS 3832, pp.640-646, 2005.
-
-
-
|