-
1
-
-
84865158402
-
-
AdmitOne Security Inc, Retrieved from
-
AdmitOne Security Inc. (2008). Home. Retrieved from http://www. admitonesecurity.com/
-
(2008)
Home
-
-
-
3
-
-
78650165017
-
User authentication through keystroke dynamics
-
doi:10.1145/581271.581272
-
Bergadano, F., Gunetti, D., & Picardi, C. (2002). User authentication through keystroke dynamics. ACM Transactions on Information and System Security, 5(4), 367-397. doi:10.1145/581271.581272
-
(2002)
ACM Transactions on Information and System Security
, vol.5
, Issue.4
, pp. 367-397
-
-
Bergadano, F.1
Gunetti, D.2
Picardi, C.3
-
4
-
-
84865155449
-
-
Retrieved from
-
BioChec. (2008). Home. Retrieved from http://www.biochec.com/
-
(2008)
Home
-
-
-
5
-
-
10044297649
-
-
New York: Springer
-
Bolle, R., Connell, J., Pankanti, S., Ratha, N., & Senior, A. (2004). Guide to biometrics. New York: Springer.
-
(2004)
Guide to Biometrics
-
-
Bolle, R.1
Connell, J.2
Pankanti, S.3
Ratha, N.4
Senior, A.5
-
6
-
-
0039921279
-
User identification via keystroke characteristics of typed names using neural networks
-
doi:10.1006/imms.1993.1092
-
Brown, M., & Rogers, S. J. (1993). User identification via keystroke characteristics of typed names using neural networks. International Journal of Man-Machine Studies, 39(6), 999-1014. doi:10.1006/imms.1993.1092
-
(1993)
International Journal of Man-machine Studies
, vol.39
, Issue.6
, pp. 999-1014
-
-
Brown, M.1
Rogers, S.J.2
-
8
-
-
79956152106
-
Use of histogram distances in iris authentication
-
Las Vegas, NV, New York: Springer
-
Choi, S.-S., Yoon, S., Cha, S.-H., & Tappert, C. C. (2004). Use of histogram distances in iris authentication. In Image Analysis and Recognition - Proceedings of MSCE-MLMTA, Las Vegas, NV (pp. 1118-1124). New York: Springer.
-
(2004)
Image Analysis and Recognition - Proceedings of MSCE-MLMTA
, pp. 1118-1124
-
-
Choi, S.-S.1
Yoon, S.2
Cha, S.-H.3
Tappert, C.C.4
-
9
-
-
79956145257
-
Keystroke biometric recognition on long-text input: A feasibility study
-
Hong Kong
-
Curtin, M., Tappert, C., Villani, M., Ngo, G., Simone, J., St. Fort, H., et al. (2006). Keystroke biometric recognition on long-text input: A feasibility study. In Proceedings of the International MultiConference of Engineers & Computer Scientists (IMECS), Hong Kong.
-
(2006)
Proceedings of the International MultiConference of Engineers & Computer Scientists (IMECS)
-
-
Curtin, M.1
Tappert, C.2
Villani, M.3
Ngo, G.4
Simone, J.5
St. Fort, H.6
-
10
-
-
36048978381
-
The problems of using ROC curve as the sole criterion in positive biometrics identification
-
Du, Y., & Chang, C.-I. (2007). The problems of using ROC curve as the sole criterion in positive biometrics identification. In Proceedings of SPIE 6579.
-
(2007)
Proceedings of SPIE 6579
-
-
Du, Y.1
Chang, C.-I.2
-
14
-
-
71749104688
-
Keystroke dynamics with low constraints svm based passphrase enrollment
-
Giot, R., El-Abed, M., & Rosenberger, C. (2009a). Keystroke dynamics with low constraints svm based passphrase enrollment. In Proceedings of the IEEE International Conference on Biometrics: Theory, Applications, and Systems (BTAS 2009).
-
(2009)
Proceedings of the IEEE International Conference on Biometrics: Theory, Applications, and Systems (BTAS 2009)
-
-
Giot, R.1
El-Abed, M.2
Rosenberger, C.3
-
15
-
-
71749100824
-
GREYC keystroke: A benchmark for keystroke dynamics biometric systems
-
Giot, R., El-Abed, M., & Rosenberger, C. (2009b). GREYC keystroke: a benchmark for keystroke dynamics biometric systems. In Proceedings of the IEEE International Conference on Biometrics: Theory, Applications, and Systems (BTAS 2009).
-
(2009)
Proceedings of the IEEE International Conference on Biometrics: Theory, Applications, and Systems (BTAS 2009)
-
-
Giot, R.1
El-Abed, M.2
Rosenberger, C.3
-
16
-
-
33745215614
-
Keystroke analysis of free text
-
DOI 10.1145/1085126.1085129
-
Gunetti, D., & Picardi, C. (2005). Keystroke analysis of free text. ACM Transactions on Information and System Security, 8(3), 312-347. doi:10.1145/1085126.1085129 (Pubitemid 43906388)
-
(2005)
ACM Transactions on Information and System Security
, vol.8
, Issue.3
, pp. 312-347
-
-
Gunetti, D.1
Picardi, C.2
-
17
-
-
79953896884
-
Keystroke dynamics: A software based biometric solution
-
Jin, L., Ke, X., Manuel, R., & Wilkerson, M. (2004). Keystroke dynamics: A software based biometric solution. In Proceedings of the 13th USENIX Security Symposium.
-
(2004)
Proceedings of the 13th USENIX Security Symposium
-
-
Jin, L.1
Ke, X.2
Manuel, R.3
Wilkerson, M.4
-
19
-
-
0023843707
-
Verifying identity via keystroke characteristics
-
Leggett, J., & Williams, G. (1988). Verifying identity via keystroke characteristics. International Journal of Man-Machine Studies, 28(1), 67-76. doi:10.1016/S0020-7373 (88) 80053-1 (Pubitemid 18653526)
-
(1988)
International Journal of Man-Machine Studies
, vol.28
, Issue.1
, pp. 67-76
-
-
Leggett John1
Williams Glen2
-
20
-
-
0041108231
-
Dynamic identity verification via keystroke characteristics
-
doi:10.1016/S0020-7373 05 80165-8
-
Leggett, J., Williams, G., Usnick, M., & Longnecker, M. (1991). Dynamic identity verification via keystroke characteristics. International Journal of Man-Machine Studies, 35(6), 859-870. doi:10.1016/S0020-7373 (05) 80165-8
-
(1991)
International Journal of Man-machine Studies
, vol.35
, Issue.6
, pp. 859-870
-
-
Leggett, J.1
Williams, G.2
Usnick, M.3
Longnecker, M.4
-
21
-
-
0038628620
-
Password hardening based on keystroke dynamics
-
doi:10.1007/s102070100006
-
Monrose, F., Reiter, M. K., & Wetzel, S. (2002). Password hardening based on keystroke dynamics. International Journal of Information Security, 1(2), 69-83. doi:10.1007/s102070100006
-
(2002)
International Journal of Information Security
, vol.1
, Issue.2
, pp. 69-83
-
-
Monrose, F.1
Reiter, M.K.2
Wetzel, S.3
-
22
-
-
0034140431
-
Keystroke dynamics as a biometric for authentication
-
DOI 10.1016/S0167-739X(99)00059-X
-
Monrose, F., & Rubin, A. D. (2000). Keystroke dynamics as a biometric for authentication. Future Generation Computer Systems, 16(4), 351-359. doi:10.1016/S0167-739X (99) 00059-X (Pubitemid 30552905)
-
(2000)
Future Generation Computer Systems
, vol.16
, Issue.4
, pp. 351-359
-
-
Monrose, F.1
Rubin, A.D.2
-
23
-
-
0042585206
-
Keystroke dynamics based authentication
-
Jain, A. K., Bolle, R., & Pankanti, S. Eds., New York: Springer
-
Obaidat, M. S., & Sadoun, B. (1999). Keystroke dynamics based authentication. In Jain, A. K., Bolle, R., & Pankanti, S. (Eds.), Biometrics: Personal Identification in Networked Society (pp. 213-230). New York: Springer.
-
(1999)
Biometrics: Personal Identification in Networked Society
, pp. 213-230
-
-
Obaidat, M.S.1
Sadoun, B.2
-
24
-
-
12844274372
-
Typing patterns: A key to user identification
-
DOI 10.1109/MSP.2004.89
-
Peacock, A., Ke, X., & Wilkerson, M. (2004). Typing patterns: A key to user identification. IEEE Security & Privacy, 2(5), 40-47. doi:10.1109/MSP.2004.89 (Pubitemid 40168625)
-
(2004)
IEEE Security and Privacy
, vol.2
, Issue.5
, pp. 40-47
-
-
Peacock, A.1
Ke, X.2
Wilkerson, M.3
-
25
-
-
77956306050
-
Keystroke dynamics
-
New York: Wiley, doi:10.1002/9780470997949. ch4
-
Revett, K. (2008). Keystroke dynamics. In Behavioral biometrics: A remote access approach (pp. 73-136). New York: Wiley. doi:10.1002/9780470997949. ch4
-
(2008)
Behavioral Biometrics: A Remote Access Approach
, pp. 73-136
-
-
Revett, K.1
-
27
-
-
33744965791
-
-
Rodrigues, R. N., Yared, G. F. G., Costa, C. R., Yabu-Uti, J. B. T., Violaro, F., & Ling, L. L. (2006). Biometric access control through numerical keyboards based on keystroke dynamics (. LNCS, 3832, 640-646.
-
(2006)
Biometric Access Control Through Numerical Keyboards Based on Keystroke Dynamics (. LNCS
, vol.3832
, pp. 640-646
-
-
Rodrigues, R.N.1
Yared, G.F.G.2
Costa, C.R.3
Yabu-Uti, J.B.T.4
Violaro, F.5
Ling, L.L.6
-
29
-
-
0036313845
-
Individuality of handwriting
-
Srihari, S. N., Cha, S., Arora, H., & Lee, S. (2002). Individuality of Handwriting. Journal of Forensic Sciences, 47(4), 1-17.
-
(2002)
Journal of Forensic Sciences
, vol.47
, Issue.4
, pp. 1-17
-
-
Srihari, S.N.1
Cha, S.2
Arora, H.3
Lee, S.4
-
30
-
-
78649285491
-
Keystroke biometric identification and authentication on long-text input
-
Wang, L., & Geng, X. Eds., Hershey, PA: IGI Global
-
Tappert, C. C., Villani, M., & Cha, S. (2009). Keystroke Biometric Identification and Authentication on Long-Text Input. In Wang, L., & Geng, X. (Eds.), Behavioral Biometrics for Human Identification: Intelligent Applications (pp. 342-367). Hershey, PA: IGI Global.
-
(2009)
Behavioral Biometrics for Human Identification: Intelligent Applications
, pp. 342-367
-
-
Tappert, C.C.1
Villani, M.2
Cha, S.3
-
32
-
-
33845529124
-
Keystroke biometric recognition studies on long-text input under ideal and application-oriented conditions
-
New York
-
Villani, M., Tappert, C., Ngo, G., Simone, J., St. Fort, H., & Cha, H.-S. (2006). Keystroke biometric recognition studies on long-text input under ideal and application-oriented conditions. In Proceedings of the Computer Vision & Pattern Recognition Workshop on Biometrics, New York.
-
(2006)
Proceedings of the Computer Vision & Pattern Recognition Workshop on Biometrics
-
-
Villani, M.1
Tappert, C.2
Ngo, G.3
Simone, J.4
St. Fort, H.5
Cha, H.-S.6
-
34
-
-
33744953911
-
On the individuality of the iris biometric
-
Yoon, S., Choi, S.-S., Cha, S.-H., Lee, Y., & Tappert, C. C. (2005). On the individuality of the iris biometric. Proc. Int. J. Graphics. Vision & Image Processing, 5(5), 63-70.
-
(2005)
Proc. Int. J. Graphics. Vision & Image Processing
, vol.5
, Issue.5
, pp. 63-70
-
-
Yoon, S.1
Choi, S.-S.2
Cha, S.-H.3
Lee, Y.4
Tappert, C.C.5
-
35
-
-
3042852406
-
Keystroke dynamics identity verification - Its problems and practical solutions
-
doi:10.1016/j.cose.2004.02.004
-
Yu, E., & Cho, S. (2004). Keystroke dynamics identity verification - Its problems and practical solutions. Computers & Security, 23(5), 428-440. doi:10.1016/j.cose.2004.02.004
-
(2004)
Computers & Security
, vol.23
, Issue.5
, pp. 428-440
-
-
Yu, E.1
Cho, S.2
|