-
1
-
-
84901529958
-
-
AdmitOne Security Inc, Retrieved in October 2008, from
-
AdmitOne Security Inc. (2008). Retrieved in October 2008, from http://www.admitonesecurity.com/
-
(2008)
-
-
-
3
-
-
78650165017
-
User authentication through keystroke dynamics
-
doi:10.1145/581271.581272
-
Bergadano, F., Gunetti, D., & Picardi, C. (2002). User authentication through keystroke dynamics. ACM Transactions on Information and System Security, 5(4), 367-397. doi:10.1145/581271.581272
-
(2002)
ACM Transactions On Information and System Security
, vol.5
, Issue.4
, pp. 367-397
-
-
Bergadano, F.1
Gunetti, D.2
Picardi, C.3
-
4
-
-
84901530213
-
-
BioChec, Retrieved in October 2008, from
-
BioChec. (2008). Retrieved in October 2008, from http://www.biochec.com/
-
(2008)
-
-
-
5
-
-
10044297649
-
-
New York, Springer
-
Bolle, R., Connell, J., Pankanti, S., Ratha, N., & Senior, A. (2004). Guide to biometrics. New York: Springer.
-
(2004)
Guide to Biometrics
-
-
Bolle, R.1
Connell, J.2
Pankanti, S.3
Ratha, N.4
Senior, A.5
-
6
-
-
0039921279
-
User identification via keystroke characteristics of typed names using neural networks
-
doi:10.1006/imms.1993.1092
-
Brown, M., & Rogers, S. J. (1993). User identification via keystroke characteristics of typed names using neural networks. International Journal of Man-Machine Studies, 39(6), 999-1014. doi:10.1006/imms.1993.1092
-
(1993)
International Journal of Man-Machine Studies
, vol.39
, Issue.6
, pp. 999-1014
-
-
Brown, M.1
Rogers, S.J.2
-
7
-
-
84877772533
-
Writer identification: Statistical analysis and dichotomizer
-
Cha, S., & Srihari, S. N. (2000). Writer identification: Statistical analysis and dichotomizer. Proc. SPR and SSPR 2000, LNCS - Advances in Pattern Recognition, 1876, 123-132.
-
(2000)
Proc. SPR and SSPR 2000, LNCS - Advances In Pattern Recognition
, vol.1876
, pp. 123-132
-
-
Cha, S.1
Srihari, S.N.2
-
8
-
-
79956152106
-
Use of histogram distances in iris authentication
-
Las Vegas, LNCS Image Analysis and Recognition, New York, Springer
-
Choi, S.-S., Yoon, S., Cha, S.-H., & Tappert, C. C. (2004). Use of histogram distances in iris authentication. Proc. MSCE-MLMTA, Las Vegas. (LNCS Image Analysis and Recognition, pp. 1118-1124). New York: Springer.
-
(2004)
Proc. MSCE-MLMTA
, pp. 1118-1124
-
-
Choi, S.-S.1
Yoon, S.2
Cha, S.-H.3
Tappert, C.C.4
-
9
-
-
79956145257
-
Keystroke biometric recognition on long-text input: A feasibility study
-
IMECS, Hong Kong
-
Curtin, M., Tappert, C., Villani, M., Ngo, G., Simone, J., St. Fort, H., & Cha, S.-H. (2006). Keystroke biometric recognition on long-text input: A feasibility study. Proc. Int. MultiConf. Engineers & Computer Scientists (IMECS), Hong Kong.
-
(2006)
Proc. Int. MultiConf. Engineers & Computer Scientists
-
-
Curtin, M.1
Tappert, C.2
Villani, M.3
Ngo, G.4
Simone, J.5
St. Fort, H.6
Cha, S.-H.7
-
13
-
-
33745215614
-
Keystroke analysis of free text
-
doi:10.1145/1085126.1085129
-
Gunetti, D., & Picardi, C. (2005). Keystroke analysis of free text. ACM Transactions on Information and System Security, 8(3), 312-347. doi:10.1145/1085126.1085129
-
(2005)
ACM Transactions On Information and System Security
, vol.8
, Issue.3
, pp. 312-347
-
-
Gunetti, D.1
Picardi, C.2
-
16
-
-
0023843707
-
Verifying identity via keystroke characteristics
-
doi:10.1016/S0020-7373(88)80053-1
-
Leggett, J., & Williams, G. (1988). Verifying identity via keystroke characteristics. International Journal of Man-Machine Studies, 28(1), 67-76. doi:10.1016/S0020-7373(88)80053-1
-
(1988)
International Journal of Man-Machine Studies
, vol.28
, Issue.1
, pp. 67-76
-
-
Leggett, J.1
Williams, G.2
-
17
-
-
0041108231
-
Dynamic identity verification via keystroke characteristics
-
doi:10.1016/S0020-7373(05)80165-8
-
Leggett, J., Williams, G., Usnick, M., & Longnecker, M. (1991). Dynamic identity verification via keystroke characteristics. International Journal of Man-Machine Studies, 35(6), 859-870. doi:10.1016/S0020-7373(05)80165-8
-
(1991)
International Journal of Man-Machine Studies
, vol.35
, Issue.6
, pp. 859-870
-
-
Leggett, J.1
Williams, G.2
Usnick, M.3
Longnecker, M.4
-
18
-
-
0038628620
-
Password hardening based on keystroke dynamics
-
doi:10.1007/s102070100006
-
Monrose, F., Reiter, M. K., & Wetzel, S. (2002). Password hardening based on keystroke dynamics. International Journal of Information Security, 1(2), 69-83. doi:10.1007/s102070100006
-
(2002)
International Journal of Information Security
, vol.1
, Issue.2
, pp. 69-83
-
-
Monrose, F.1
Reiter, M.K.2
Wetzel, S.3
-
19
-
-
0034140431
-
Keystroke dynamics as a biometric for authentication
-
doi:10.1016/S0167-739X(99)00059-X
-
Monrose, F., & Rubin, A. D. (2000). Keystroke dynamics as a biometric for authentication. Future Generation Computer Systems, 16(4), 351-359. doi:10.1016/S0167-739X(99)00059-X
-
(2000)
Future Generation Computer Systems
, vol.16
, Issue.4
, pp. 351-359
-
-
Monrose, F.1
Rubin, A.D.2
-
20
-
-
0042585206
-
Keystroke dynamics based authentication
-
In A. K. Jain, R. Bolle & S. Pankanti (Eds.), New York, Springer
-
Obaidat, M. S., & Sadoun, B. (1999). Keystroke dynamics based authentication. In A. K. Jain, R. Bolle & S. Pankanti (Eds.), Biometrics: Personal identification in networked society (pp. 213-230). New York: Springer.
-
(1999)
Biometrics: Personal Identification In Networked Society
, pp. 213-230
-
-
Obaidat, M.S.1
Sadoun, B.2
-
21
-
-
12844274372
-
Typing patterns: A key to user identification
-
doi:10.1109/MSP.2004.89
-
Peacock, A., Ke, X., & Wilkerson, M. (2004). Typing patterns: A key to user identification. IEEE Security & Privacy, 2(5), 40-47. doi:10.1109/MSP.2004.89
-
(2004)
IEEE Security & Privacy
, vol.2
, Issue.5
, pp. 40-47
-
-
Peacock, A.1
Ke, X.2
Wilkerson, M.3
-
23
-
-
26544457660
-
-
Retrieved in May 2005, from
-
Song, D., Venable, P., & Perrig, A. (1997). User recognition by keystroke latency pattern analysis. Retrieved in May 2005, from http://citeseer.ist.psu.edu/song97user.html
-
(1997)
User Recognition By Keystroke Latency Pattern Analysis
-
-
Song, D.1
Venable, P.2
Perrig, A.3
-
24
-
-
0036313845
-
Individuality of handwriting
-
Srihari, S. N., Cha, S., Arora, H., & Lee, S. (2002). Individuality of handwriting. Journal of Forensic Sciences, 47(4), 1-17.
-
(2002)
Journal of Forensic Sciences
, vol.47
, Issue.4
, pp. 1-17
-
-
Srihari, S.N.1
Cha, S.2
Arora, H.3
Lee, S.4
-
26
-
-
33845529124
-
Keystroke biometric recognition studies on long-text input under ideal and application-oriented conditions
-
New York, Washington: IEEE Computer Society
-
Villani, M., Tappert, C., Ngo, G., Simone, J., St. Fort, H., & Cha, S.-H. (2006). Keystroke biometric recognition studies on long-text input under ideal and application-oriented conditions. Proc. 2006 Conference on Computer Vision and Pattern Recognition, Workshop on Biometrics, New York (pp. 39-46). Washington: IEEE Computer Society.
-
(2006)
Proc. 2006 Conference On Computer Vision and Pattern Recognition, Workshop On Biometrics
, pp. 39-46
-
-
Villani, M.1
Tappert, C.2
Ngo, G.3
Simone, J.4
St. Fort, H.5
Cha, S.-H.6
-
27
-
-
4544337230
-
-
New York, McGraw-Hill
-
Woodward, J. D., Jr., Orlans, N. M., & Higgins, P. T. (2002). Biometrics (p. 107). New York: McGraw-Hill.
-
(2002)
Biometrics
, pp. 107
-
-
Woodward Jr., J.D.1
Orlans, N.M.2
Higgins, P.T.3
-
28
-
-
33744953911
-
On the individuality of the iris biometric
-
Yoon, S., Choi, S.-S., Cha, S.-H., Lee, Y., & Tappert, C. C. (2005). On the individuality of the iris biometric. Proc. Int. J. Graphics. Vision & Image Processing, 5(5), 63-70.
-
(2005)
Proc. Int. J. Graphics. Vision & Image Processing
, vol.5
, Issue.5
, pp. 63-70
-
-
Yoon, S.1
Choi, S.-S.2
Cha, S.-H.3
Lee, Y.4
Tappert, C.C.5
-
29
-
-
3042852406
-
Keystroke dynamics identity verification-its problems and practical solutions
-
doi:10.1016/j.cose.2004.02.004
-
Yu, E., & Cho, S. (2004). Keystroke dynamics identity verification-its problems and practical solutions. Computers & Security, 23(5), 428-440. doi:10.1016/j.cose.2004.02.004
-
(2004)
Computers & Security
, vol.23
, Issue.5
, pp. 428-440
-
-
Yu, E.1
Cho, S.2
|