-
1
-
-
67650971822
-
-
available at: (accessed 18 April 2007)
-
Abbott, J. (2007), "Smart cards: How secure are they?", available at: www.sans.org/reading_room/whitepapers/authentication/ 131.php, (accessed 18 April 2007).
-
(2007)
"Smart Cards: How Secure Are They?"
-
-
Abbott, J.1
-
2
-
-
34249885740
-
"Privacy preserving multi-factor authentication with biometrics"
-
Bhargav-Spantzel, A., Squicciarini, A., Shimon, M., Young, M., Bertino, E. and Elliot, S. (2006), "Privacy preserving multi-factor authentication with biometrics", Proceedings of the 2006 Workshop on Digital Identity Management, Vol. 2006, pp. 63-72.
-
(2006)
Proceedings of the 2006 Workshop on Digital Identity Management
, vol.2006
, pp. 63-72
-
-
Bhargav-Spantzel, A.1
Squicciarini, A.2
Shimon, M.3
Young, M.4
Bertino, E.5
Elliot, S.6
-
4
-
-
51449118740
-
"Biometric gait authentication using accelerometer sensor"
-
Gafurov, D., Helkala, K. and Søndrol, T. (2006), "Biometric gait authentication using accelerometer sensor", Journal of computers, Vol. 1 No. 7, pp. 51-9.
-
(2006)
Journal of Computers
, vol.1
, Issue.7
, pp. 51-59
-
-
Gafurov, D.1
Helkala, K.2
Søndrol, T.3
-
5
-
-
34548086500
-
"Spoof attacks on gait authentication system"
-
Gafurov, D., Snekkenes, E. and Bours, P. (2007), "Spoof attacks on gait authentication system", Transactions on Information Forensics and Security, Vol. 2 No. 2, pp. 491-502.
-
(2007)
Transactions on Information Forensics and Security
, vol.2
, Issue.2
, pp. 491-502
-
-
Gafurov, D.1
Snekkenes, E.2
Bours, P.3
-
6
-
-
67650940083
-
"User's trust in biometric authentication systems - Do not take end-user for granted"
-
MS thesis in Information Security, Gjøvik University College, Gjøvik
-
Gravnås, H. (2005), "User's trust in biometric authentication systems - do not take end-user for granted", MS thesis in Information Security, Gjøvik University College, Gjøvik.
-
(2005)
-
-
Gravnås, H.1
-
8
-
-
0032678243
-
"The smart card: Don't leave home without it"
-
Husemann, D. (1999), "The smart card: Don't leave home without it", IEEE Concurrency, Vol. 7, pp. 24-7.
-
(1999)
IEEE Concurrency
, vol.7
, pp. 24-27
-
-
Husemann, D.1
-
9
-
-
0036522407
-
"FVC2000: Fingerprint verification competition"
-
Maio, D., Maltoni, D., Cappelli, R., Wayman, J. and Jain, A. (2002), "FVC2000: Fingerprint verification competition", Transactions on Pattern Analysis and Machine Intelligence, Vol. 24, pp. 402-12.
-
(2002)
Transactions on Pattern Analysis and Machine Intelligence
, vol.24
, pp. 402-412
-
-
Maio, D.1
Maltoni, D.2
Cappelli, R.3
Wayman, J.4
Jain, A.5
-
10
-
-
1342275940
-
-
Springer, New York, NY
-
Maltoni, D., Maio, D., Jain, A.K. and Prabhakar, S. (2003), Handbook of Fingerprint Recognition, Springer, New York, NY.
-
(2003)
Handbook of Fingerprint Recognition
-
-
Maltoni, D.1
Maio, D.2
Jain, A.K.3
Prabhakar, S.4
-
11
-
-
1642298729
-
"Best practices in testing and reporting performance of biometric devices NPL report CMSC 14/02"
-
Mansfield, A. and Wayman, J. (2002), "Best practices in testing and reporting performance of biometric devices NPL report CMSC 14/02", NPL Report CMSC 14/02 Version 2.01.
-
(2002)
NPL Report CMSC 14/02 Version 2.01
-
-
Mansfield, A.1
Wayman, J.2
-
12
-
-
67650971816
-
-
MISCO.CO.UK Web site available at: (accessed 26 March)
-
MISCO.CO.UK Web site (2008), "RSA SecurID(applicance", available at: www.misco.co.uk/CONTENT/PROMOS/RSA/SECUREID.ASP?bp1, (accessed 26 March).
-
(2008)
"RSA SecurID(applicance"
-
-
-
13
-
-
67650968228
-
-
NEUROtechnologijaWeb Site available at (accessed 26 March)
-
NEUROtechnologijaWeb Site (2008a), "Prices for our products", available at: www.neurotechnologija.com/prices.html, (accessed 26 March).
-
(2008)
"Prices for Our Products"
-
-
-
14
-
-
84926045216
-
-
NEUROtechnologija Web Site available at: (accessed 26 March)
-
NEUROtechnologija Web Site (2008b), "VeriFinger, PC-based fingerprint recognition technology", available at: www.neurotechnologija.com/verifinger.html, (accessed 26 March).
-
(2008)
"VeriFinger, PC-based Fingerprint Recognition Technology"
-
-
-
16
-
-
10044293457
-
"Comparing passwords, tokens, and biometric for user authentication"
-
O'Gorman, L. (2003), "Comparing passwords, tokens, and biometric for user authentication", Proceedings of IEEE, Vol. 91, pp. 2019-40.
-
(2003)
Proceedings of IEEE
, vol.91
, pp. 2019-2040
-
-
O'Gorman, L.1
-
17
-
-
0034290919
-
"The FERET evaluation methodology for face-recognition algorithms"
-
Phillips, P.J., Moon, H., Rizvi, S.A. and Rauss, P.J. (2000), "The FERET evaluation methodology for face-recognition algorithms", Transactions on Pattern Analysis and Machine Intelligence, Vol. 22, pp. 1090-104.
-
(2000)
Transactions on Pattern Analysis and Machine Intelligence
, vol.22
, pp. 1090-1104
-
-
Phillips, P.J.1
Moon, H.2
Rizvi, S.A.3
Rauss, P.J.4
-
18
-
-
12244272072
-
"Word association computer passwords: The effect of formulation techniques on recall and guessing rates"
-
Pond, R., Podd, J., Bunnell, J. and Henderson, R. (2000), "Word association computer passwords: The effect of formulation techniques on recall and guessing rates", Computers & Security, Vol. 19, pp. 645-56.
-
(2000)
Computers & Security
, vol.19
, pp. 645-656
-
-
Pond, R.1
Podd, J.2
Bunnell, J.3
Henderson, R.4
-
20
-
-
67650955688
-
"Threat analysis: How can we compare different authentication methods?"
-
paper presented in the Hyatt Regency Crystal City, Arlington, VA
-
Statham, P. (2005), "Threat analysis: How can we compare different authentication methods?", paper presented in the Biometric Consortium, 2005, Hyatt Regency Crystal City, Arlington, VA.
-
(2005)
Biometric Consortium, 2005
-
-
Statham, P.1
-
21
-
-
84925983060
-
-
StorageMojo Web site available at: Storagemojo.com/?page_ id = 417, (accessed 26 March 2008)
-
StorageMojo Web site (2007), "RSA security price list", available at: Storagemojo.com/?page_ id = 417, (accessed 26 March 2008).
-
(2007)
"RSA Security Price List"
-
-
-
22
-
-
12844275960
-
"Password memorability and security: Empirical results"
-
September/October
-
Yan, J., Blackwell, A., Anderson, R. and Grant, A. (2004), "Password memorability and security: Empirical results", IEEE Security and Privacy, September/October, pp. 25-31.
-
(2004)
IEEE Security and Privacy
, pp. 25-31
-
-
Yan, J.1
Blackwell, A.2
Anderson, R.3
Grant, A.4
|