-
1
-
-
0000217847
-
-
A. Jain, R. Bolle, S. Pankanti Eds, pp, Kluwer Academic Publishers
-
A. Jain, R. Bolle, and S. Pankanti, Introduction to Biometrics. In Biometrics. Personal Identification in Networked Society. A. Jain, R. Bolle, S. Pankanti (Eds.), pp. 1-41. Kluwer Academic Publishers, 2003.
-
(2003)
Introduction to Biometrics. In Biometrics. Personal Identification in Networked Society
, pp. 1-41
-
-
Jain, A.1
Bolle, R.2
Pankanti, S.3
-
2
-
-
12844274372
-
Typing patterns: A Key to User Identification
-
A. Peacock, X. Ke, and M. Wilkerson, "Typing patterns: A Key to User Identification," IEEE Security and Privacy, vol. 2, no. 5, pp. 40-47, 2004.
-
(2004)
IEEE Security and Privacy
, vol.2
, Issue.5
, pp. 40-47
-
-
Peacock, A.1
Ke, X.2
Wilkerson, M.3
-
3
-
-
60349130920
-
-
R. Gaines, W. Lisowski, S. Press, and S. Shapiro, Authentication by keystroke timing: Some preliminary results, Rand Report R-256-NSF, Rand Corp, 1980.
-
R. Gaines, W. Lisowski, S. Press, and S. Shapiro, "Authentication by keystroke timing: Some preliminary results," Rand Report R-256-NSF, Rand Corp, 1980.
-
-
-
-
4
-
-
0025384135
-
Identity authorization based on keystroke latencies
-
R. Joyce and G. Gupta, "Identity authorization based on keystroke latencies," Communications of the ACM, vol. 33, no. 2, pp 168-176, 1990.
-
(1990)
Communications of the ACM
, vol.33
, Issue.2
, pp. 168-176
-
-
Joyce, R.1
Gupta, G.2
-
6
-
-
0038628620
-
Password hardening based on keystroke dynamics
-
F. Monrose, M. K. Reiter, and S. Wetzal, "Password hardening based on keystroke dynamics," International Journal of Information Security, pp. 69-83, 2001.
-
(2001)
International Journal of Information Security
, pp. 69-83
-
-
Monrose, F.1
Reiter, M.K.2
Wetzal, S.3
-
7
-
-
38249026503
-
An application of fuzzy algorithms in a computer access security system
-
B. Hussien, S. Bleha, and R. McLaren, "An application of fuzzy algorithms in a computer access security system," Pattern Recognition Letters, vol. 9, pp. 39-43, 1989.
-
(1989)
Pattern Recognition Letters
, vol.9
, pp. 39-43
-
-
Hussien, B.1
Bleha, S.2
McLaren, R.3
-
8
-
-
0031275601
-
Enhanced password authentication through fuzzy logic
-
Nov/Dec
-
W. G. de Ru and J. Eloff, "Enhanced password authentication through fuzzy logic," IEEE Expert, vol. 12, no. 6, pp. 38-45, Nov/Dec, 1997.
-
(1997)
IEEE Expert
, vol.12
, Issue.6
, pp. 38-45
-
-
de Ru, W.G.1
Eloff, J.2
-
10
-
-
0031281215
-
Simulation evaluation study of neural network techniques to computer user identification
-
M. S. Obaidat and B. A. Sadoun, "Simulation evaluation study of neural network techniques to computer user identification," Information Sciences, vol. 102, pp. 239-258, 1997.
-
(1997)
Information Sciences
, vol.102
, pp. 239-258
-
-
Obaidat, M.S.1
Sadoun, B.A.2
-
11
-
-
33744952566
-
GA SVM wrapper ensemble for keystroke dynamics authentication
-
Hong Kong, pp
-
K. S. Sung and S. Cho, "GA SVM wrapper ensemble for keystroke dynamics authentication," Proc. of International Conference on Biometrics, Hong Kong, pp. 654-660, 2006.
-
(2006)
Proc. of International Conference on Biometrics
, pp. 654-660
-
-
Sung, K.S.1
Cho, S.2
-
13
-
-
60349113493
-
-
K. Revert, S. Magalhaes, and H. Santos, Developing a keystroke dynamics based agent using rough sets, The 2005 IEEE/WIC/ACM Interna-tional Joint Conference on Web Intelligence and Intelligent Agent Technology Workshop on Rough Sets and Soft Computing in Intelligent Agents and Web Technology, Compiegne, France, pp. 56-61, 19-22 September, 2005.
-
K. Revert, S. Magalhaes, and H. Santos, "Developing a keystroke dynamics based agent using rough sets," The 2005 IEEE/WIC/ACM Interna-tional Joint Conference on Web Intelligence and Intelligent Agent Technology Workshop on Rough Sets and Soft Computing in Intelligent Agents and Web Technology, Compiegne, France, pp. 56-61, 19-22 September, 2005.
-
-
-
-
14
-
-
38349044845
-
On the use of multiple sequence alignment for user authentication via keystroke dynamics
-
University of East London, pp, 16-18 April
-
K. Revett, "On the use of multiple sequence alignment for user authentication via keystroke dynamics," Proc. of International Conference on Global eSecurity, University of East London, pp. 112-120, 16-18 April, 2007.
-
(2007)
Proc. of International Conference on Global eSecurity
, pp. 112-120
-
-
Revett, K.1
-
16
-
-
0014757386
-
A general method applicable to the search for similarities in the amino acid sequence of two proteins
-
S. B. Needleman and C. D. Wunsch, "A general method applicable to the search for similarities in the amino acid sequence of two proteins," J. Mol. Biol. vol. 48, pp. 443-453, 1970.
-
(1970)
J. Mol. Biol
, vol.48
, pp. 443-453
-
-
Needleman, S.B.1
Wunsch, C.D.2
-
17
-
-
0019887799
-
Identification of common molecular subsequences
-
T. F. Smith and M. S. Waterman, "Identification of common molecular subsequences," J. Mol. Biol. vol. 147, pp. 95-197, 1981.
-
(1981)
J. Mol. Biol
, vol.147
, pp. 95-197
-
-
Smith, T.F.1
Waterman, M.S.2
-
18
-
-
0031070158
-
Automatic on-line signature verification
-
February
-
V. Nalwa, "Automatic on-line signature verification," Proceedings of the IEEE, vol. 85, pp. 213-239, February 1997.
-
(1997)
Proceedings of the IEEE
, vol.85
, pp. 213-239
-
-
Nalwa, V.1
-
19
-
-
0036887670
-
Online signature verification
-
A. K. Jain, F. D. Griess, and S. D. Connell, "Online signature verification," Pattern recognition, vol. 35, pp. 2963-2972, 2002.
-
(2002)
Pattern recognition
, vol.35
, pp. 2963-2972
-
-
Jain, A.K.1
Griess, F.D.2
Connell, S.D.3
-
20
-
-
0029209272
-
Robust text-independent speaker identification using Gaussian mixture speaker models
-
D. A. Reynolds, and R. C. Rose, "Robust text-independent speaker identification using Gaussian mixture speaker models," IEEE Trans on Speech and Audio Processing, vol. 3, no. 1, pp. 72-83, 1995.
-
(1995)
IEEE Trans on Speech and Audio Processing
, vol.3
, Issue.1
, pp. 72-83
-
-
Reynolds, D.A.1
Rose, R.C.2
-
21
-
-
33745433991
-
Multispectral fingerprint biometrics
-
United States Military Academy, West Point, NY, pp
-
R. K. Rowe, K. A. Nixon, and S. P. Corcoran, "Multispectral fingerprint biometrics," Proc. of the IEEE Workshop on Information Assurance and Security, United States Military Academy, West Point, NY, pp. 16-20, 2005.
-
(2005)
Proc. of the IEEE Workshop on Information Assurance and Security
, pp. 16-20
-
-
Rowe, R.K.1
Nixon, K.A.2
Corcoran, S.P.3
-
22
-
-
1342275940
-
-
Springer, New York
-
D. Maltoni, D. Maio, A. Jain, and S. Prabhakar, Handbook of Fingerprint Recognition, pp. 59-61, Springer, New York, 2003.
-
(2003)
Handbook of Fingerprint Recognition
, pp. 59-61
-
-
Maltoni, D.1
Maio, D.2
Jain, A.3
Prabhakar, S.4
|