-
2
-
-
84901511704
-
Eignung des biometrischen merkmals tippverhalten zur benutzerauthentisierung
-
In D. Bartmann, (Eds.), FORWIN-Tagung, Aachen
-
Bartmann, D., & Breu, C. (2004). Eignung des biometrischen Merkmals Tippverhalten zur Benutzerauthentisierung. In D. Bartmann, (Eds.), Überbetriebliche Integration von Anwendungssystemen (pp. 321-343). FORWIN-Tagung, Aachen.
-
(2004)
Überbetriebliche Integration Von Anwendungssystemen
, pp. 321-343
-
-
Bartmann, D.1
Breu, C.2
-
4
-
-
0345996892
-
Evaluating authentication systems using bootstrap confidence intervals
-
Morristown NJ, USA
-
Bolle, R. M., Ratha, N. K., & Pankanti, S. (1999). Evaluating Authentication Systems Using Bootstrap Confidence Intervals. Proceedings of the 1999 IEEE Workshop on Automatic Identification Advanced Technologies (WAIAT-99), Morristown NJ, USA.
-
(1999)
Proceedings of the 1999 IEEE Workshop on Automatic Identification Advanced Technologies (WAIAT-99)
-
-
Bolle, R.M.1
Ratha, N.K.2
Pankanti, S.3
-
5
-
-
0002583131
-
Studies in the physiology and psychology of the telegraphic language
-
Bryan, W. L., & Harter, N. (1897). Studies in the Physiology and Psychology of the Telegraphic Language. Psychological Review, 4(1), 27-53.
-
(1897)
Psychological Review
, vol.4
, Issue.1
, pp. 27-53
-
-
Bryan, W.L.1
Harter, N.2
-
6
-
-
0005327658
-
Web based keystroke dynamics identity verification using neural networks
-
Cho, S., Han, C., Han, D., & Kim, H. (2001). Web based keystroke dynamics identity verification using neural networks. Journal of Organisational Computing & Electronic Commerce, 10(4), 295-307.
-
(2001)
Journal of Organisational Computing & Electronic Commerce
, vol.10
, Issue.4
, pp. 295-307
-
-
Cho, S.1
Han, C.2
Han, D.3
Kim, H.4
-
7
-
-
84876762816
-
Using keystroke analysis is a mechanism for subscriber authentication on mobile handsets
-
Clarke, N., Furnell, S., Reynolds, P., & Lines, B. (2003). Using Keystroke Analysis is a Mechanism for Subscriber Authentication on Mobile Handsets. SEC, (pp. 97-108).
-
(2003)
SEC
, pp. 97-108
-
-
Clarke, N.1
Furnell, S.2
Reynolds, P.3
Lines, B.4
-
10
-
-
0039921280
-
Personal identification apparatus
-
Garcia, J. D. (1986). Personal identification apparatus. United States patent number: 4 621 334.
-
(1986)
United States Patent Number
, vol.4
, Issue.621
, pp. 334
-
-
Garcia, J.D.1
-
11
-
-
33745215614
-
Keystroke analysis of free text
-
Gunetti, D., & Picardi, C. (2005). Keystroke Analysis of Free Text. ACM Transactions on Information and System Security, 3(5), 312-347.
-
(2005)
ACM Transactions on Information and System Security
, vol.3
, Issue.5
, pp. 312-347
-
-
Gunetti, D.1
Picardi, C.2
-
13
-
-
0003684449
-
-
New York: Spring-Verlag
-
Hastie, T., Tibshirani, R., & Friedman, J. (2001). The Elements of Statistical Learning; Data Mining, Inference. New York: Spring-Verlag.
-
(2001)
The Elements of Statistical Learning; Data Mining, Inference
-
-
Hastie, T.1
Tibshirani, R.2
Friedman, J.3
-
14
-
-
27944479591
-
Evaluation on a keystroke authentication system by keying force incorporated with temporal characteristics of keystroke dynamics
-
Kotani, K., & Horii, K. (2005). Evaluation on a keystroke authentication system by keying force incorporated with temporal characteristics of keystroke dynamics. Behaviour & Information Technology, 4(24), 289-302.
-
(2005)
Behaviour & Information Technology
, vol.4
, Issue.24
, pp. 289-302
-
-
Kotani, K.1
Horii, K.2
-
16
-
-
0038628620
-
Password hardening based on keystroke dynamics
-
New York: Springer-Verlag
-
Monrose, F., Reiter, M. K., & Wetzel, S. (2001). Password hardening based on keystroke dynamics. International Journal of Information Security, 1(2). New York: Springer-Verlag,
-
(2001)
International Journal of Information Security
, vol.1
, Issue.2
-
-
Monrose, F.1
Reiter, M.K.2
Wetzel, S.3
-
17
-
-
0031121887
-
Verification of computer user using keystroke dynamics
-
Obaidat, M. S., & Sadoun, B. (1997). Verification of Computer User Using Keystroke Dynamics. IEEE Transactions on Systems, Man, and Cybernetics - Part B, 27(2), 261-269.
-
(1997)
IEEE Transactions on Systems, Man, and Cybernetics - Part B
, vol.27
, Issue.2
, pp. 261-269
-
-
Obaidat, M.S.1
Sadoun, B.2
-
18
-
-
12844274372
-
Typing patterns: A key to user identification
-
Peacock, A., Ke, X., & Wilkerson, M. (2004). Typing Patterns: A Key to User Identification. IEEE Security and Privacy, 5(2), 40-47.
-
(2004)
IEEE Security and Privacy
, vol.5
, Issue.2
, pp. 40-47
-
-
Peacock, A.1
Ke, X.2
Wilkerson, M.3
-
19
-
-
24644438726
-
A parallel decision tree-based method for user authentication based on keystroke patterns
-
Sheng, Y., Phoha, V. V., & Rovnyak, S.M. (2005). A Parallel Decision Tree-Based Method for User Authentication Based on Keystroke Patterns. IEEE Transactions on Systems, Man, and Cybernetics - Part B, 35(4), 826-833.
-
(2005)
IEEE Transactions on Systems, Man, and Cybernetics - Part B
, vol.35
, Issue.4
, pp. 826-833
-
-
Sheng, Y.1
Phoha, V.V.2
Rovnyak, S.M.3
-
20
-
-
12844256823
-
Keyboard apparatus for personal identification
-
Spillane, R. J. (1975). Keyboard apparatus for personal identification. IBM Technical Disclosure Bulletin, 17(11), 3346.
-
(1975)
IBM Technical Disclosure Bulletin
, vol.17
, Issue.11
, pp. 3346
-
-
Spillane, R.J.1
-
21
-
-
0041108230
-
Method and apparatus for verifying an individual's identity
-
Young, J. R., & Hammon, R. W. (1989). Method and apparatus for verifying an individual's identity. United States patent number: 4 805 222.
-
(1989)
United States Patent Number
, vol.4
, Issue.805
, pp. 222
-
-
Young, J.R.1
Hammon, R.W.2
|