-
1
-
-
79952386236
-
-
In Proceeding(s) of the 1st Indian International Conference, 1308-1051
-
L. C. F. Araújo, L. H. R. Sucupira Jr., M. G. Lizárraga, L. L. Ling, and J. B. T. Yabu-Uti, "A fuzzy logic approach in typing biometrics user authentication", In Proceeding(s) of the 1st Indian International Conference, pp.1308-1051, 2003.
-
(2003)
A Fuzzy Logic Approach In Typing Biometrics User Authentication
-
-
Araújo, L.C.F.1
Sucupira Jr., L.H.R.2
Lizárraga, M.G.3
Ling, L.L.4
Yabu-Uti, J.B.T.5
-
2
-
-
13244284703
-
User authentication through typing biometrics features
-
L. C. F. Araújo, L. H. R. Sucupira Jr., M. G. Lizárraga, L. L. Ling, and J. B. T. Yabu-Uti, "User authentication through typing biometrics features", IEEE Transactions on Signal Processing, vol. 53, no. 2, pp.851-855, 2005.
-
(2005)
IEEE Transactions On Signal Processing
, vol.53
, Issue.2
, pp. 851-855
-
-
Araújo, L.C.F.1
Sucupira Jr., L.H.R.2
Lizárraga, M.G.3
Ling, L.L.4
Yabu-Uti, J.B.T.5
-
3
-
-
51749122888
-
-
In Proceeding(s) of the IEEE International Joint Conference on Neural Networks
-
G. L. F. Azevedo, G. D. C. Cavalcanti, and E. C. B. Carvalho Filho, "Hybrid solution for the feature selection in personal identification problems through keystroke dynamics", In Proceeding(s) of the IEEE International Joint Conference on Neural Networks, pp.1947-1952, 2007.
-
(2007)
Hybrid Solution For the Feature Selection In Personal Identification Problems Through Keystroke Dynamics
, pp. 1947-1952
-
-
Azevedo, G.L.F.1
Cavalcanti, G.D.C.2
Filho, E.C.B.C.3
-
4
-
-
78650165017
-
User authentication through keystroke dynamics
-
F. Bergadano, D. Gunetti, and C. Picardi, "User authentication through keystroke dynamics", ACM Transactions on Information and System Security, vol. 5, no. 4, pp. 367-397, 2002.
-
(2002)
ACM Transactions On Information and System Security
, vol.5
, Issue.4
, pp. 367-397
-
-
Bergadano, F.1
Gunetti, D.2
Picardi, C.3
-
5
-
-
0026121425
-
Dimensionality reduction and feature extraction applications in identifying computer users
-
S. A. Bleha and M. S. Obaidat, "Dimensionality reduction and feature extraction applications in identifying computer users", IEEE Transactions on System, Man, and Cybernetics, vol. 21, no. 2, pp.452-456, 1991.
-
(1991)
IEEE Transactions On System, Man, and Cybernetics
, vol.21
, Issue.2
, pp. 452-456
-
-
Bleha, S.A.1
Obaidat, M.S.2
-
6
-
-
0027602443
-
Computer users verification using the perceptron algorithm
-
S. A. Bleha and M. S. Obaidat, "Computer users verification using the perceptron algorithm", IEEE Transactions on System, Man, and Cybernetics, vol. 23, no. 3, pp.900-902, 1993.
-
(1993)
IEEE Transactions On System, Man, and Cybernetics
, vol.23
, Issue.3
, pp. 900-902
-
-
Bleha, S.A.1
Obaidat, M.S.2
-
7
-
-
0025541584
-
Computer-access security systems using keystroke dynamics
-
S. A. Bleha, C. Slivinsky, and B. Hussien, "Computer-access security systems using keystroke dynamics", IEEE Transactions on Pattern Analysis and Machine Intelligence, vol. 12, no. 12, pp.1217-1222, 1990.
-
(1990)
IEEE Transactions On Pattern Analysis and Machine Intelligence
, vol.12
, Issue.12
, pp. 1217-1222
-
-
Bleha, S.A.1
Slivinsky, C.2
Hussien, B.3
-
8
-
-
79952424168
-
An Improved Biometrics-based User Authentication Scheme without Concurrency System
-
C. C. Chang, S. C. Chang, and Y. W. Lai, An Improved Biometrics-based User Authentication Scheme without Concurrency System, IJIIP: International Journal of Intelligent Information Processing, vol. 1, no. 1, pp. 41-49, 2010.
-
(2010)
IJIIP: International Journal of Intelligent Information Processing
, vol.1
, Issue.1
, pp. 41-49
-
-
Chang, C.C.1
Chang, S.C.2
Lai, Y.W.3
-
9
-
-
4243165683
-
Cryptanalysis of simple authenticated key agreement protocols
-
T. Y. Chang, C. C. Yang, and M. S. Hwang, "Cryptanalysis of simple authenticated key agreement protocols", IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences, vol. E87-A, no. 8, pp.2174-2176, 2004.
-
(2004)
IEICE Transactions On Fundamentals of Electronics, Communications and Computer Sciences
, vol.87
, Issue.8
, pp. 2174-2176
-
-
Chang, T.Y.1
Yang, C.C.2
Hwang, M.S.3
-
10
-
-
18444399366
-
Simple authenticated key agreement and protected password change protocol
-
T. Y. Chang, W. P. Yang, and M. S. Hwang, "Simple authenticated key agreement and protected password change protocol", Computers & Mathematics with Applications, vol. 49, no. 5-6, pp.703-714, 2005.
-
(2005)
Computers & Mathematics With Applications
, vol.49
, Issue.5-6
, pp. 703-714
-
-
Chang, T.Y.1
Yang, W.P.2
Hwang, M.S.3
-
11
-
-
77953251280
-
A personalized rhythm click-based authentication system
-
T. Y. Chang, Y. J. Yang, and C. C. Peng, "A personalized rhythm click-based authentication system", Information Management and Computer Security, vol. 18, no. 2, pp. 72-85, 2010.
-
(2010)
Information Management and Computer Security
, vol.18
, Issue.2
, pp. 72-85
-
-
Chang, T.Y.1
Yang, Y.J.2
Peng, C.C.3
-
12
-
-
38049049380
-
Keystroke dynamics for biometrics identification
-
, Lecture Notes in Computer Science
-
M. Choras and P. Mroczkowski, "Keystroke dynamics for biometrics identification", in Adaptive and Natural Computing Algorithm}, pp.424-431, Lecture Notes in Computer Science 4432, 2007.
-
(2007)
Adaptive and Natural Computing Algorithm
, vol.4432
, pp. 424-431
-
-
Choras, M.1
Mroczkowski, P.2
-
13
-
-
0031275601
-
Enhanced password authentication through fuzzy logic
-
W. G. de Ru and J. H. P. Eloff, "Enhanced password authentication through fuzzy logic", IEEE Expert: Intelligent Systems and Their Applications, vol. 12, no. 6, pp. 38-45, 1997.
-
(1997)
IEEE Expert: Intelligent Systems and Their Applications
, vol.12
, Issue.6
, pp. 38-45
-
-
de Ru, W.G.1
Eloff, J.H.P.2
-
14
-
-
33745198933
-
Keystroke analysis of different languages: A case study
-
Lecture Notes in Computer Science
-
D. Gunetti, C. Picardi, and G. Ruffo, "Keystroke analysis of different languages: A case study", in Advances in Intelligent Data Analysis VI, pp.133-144, Lecture Notes in Computer Science 3646, 2005.
-
(2005)
Advances In Intelligent Data Analysis VI
, vol.3646
, pp. 133-144
-
-
Gunetti, D.1
Picardi, C.2
Ruffo, G.3
-
15
-
-
0034497380
-
-
In Proceeding(s) of the IEEE International Conference on System, Man, and Cybernetics
-
S. Haider, A. Abbas, and A. K. Zaidi, "A multi-technique approach for user identification through keystroke dynamics", In Proceeding(s) of the IEEE International Conference on System, Man, and Cybernetics, pp.1336-1341, 2000.
-
(2000)
A Multi-technique Approach For User Identification Through Keystroke Dynamics
, pp. 1336-1341
-
-
Haider, S.1
Abbas, A.2
Zaidi, A.K.3
-
16
-
-
37849023553
-
User classification for keystroke dynamics authentication
-
Lecture Notes in Computer Science
-
S. Hocquet, J. Y. Ramel, and H. Cardot, "User classification for keystroke dynamics authentication", in Advances in Biometrics, pp.531-539, Lecture Notes in Computer Science 4642, 2007.
-
(2007)
Advances In Biometrics
, vol.4642
, pp. 531-539
-
-
Hocquet, S.1
Ramel, J.Y.2
Cardot, H.3
-
17
-
-
56049086396
-
-
IEEE Transactions on Systems, Man, and Cybernetics-Part C: Applications and Reviews
-
D. Hosseinzadeh and S. Krishnan, "Gaussian mixture modeling of keystroke patterns for biometric applications", IEEE Transactions on Systems, Man, and Cybernetics-Part C: Applications and Reviews, vol. 38, no. 6, pp.816-826, 2008.
-
(2008)
Gaussian Mixture Modeling of Keystroke Patterns For Biometric Applications
, vol.38
, Issue.6
, pp. 816-826
-
-
Hosseinzadeh, D.1
Krishnan, S.2
-
18
-
-
51249099350
-
-
In Proceeding(s) of the IEEE International Conference on Communications
-
J. Hu, D. Gingrich, and A. Sentosa, "A k-nearest neighbor approach for user authentication through biometric keystroke dynamics", In Proceeding(s) of the IEEE International Conference on Communications}, pp.1556-1560, 2008.
-
(2008)
A K-nearest Neighbor Approach For User Authentication Through Biometric Keystroke Dynamics
, pp. 1556-1560
-
-
Hu, J.1
Gingrich, D.2
Sentosa, A.3
-
19
-
-
0003987134
-
-
New York, Boston, Dordrecht, London, and Moscow: Kluwer Academic
-
A. K. Jain, R. Bolle, and S. Pankanti, Biometrics: Personal Identification in Networked Society, New York, Boston, Dordrecht, London, and Moscow: Kluwer Academic, 2002.
-
(2002)
Biometrics: Personal Identification In Networked Society
-
-
Jain, A.K.1
Bolle, R.2
Pankanti, S.3
-
20
-
-
0025384135
-
Identity authentication based on keystroke latencies
-
R. Joyce and G. Gupta, "Identity authentication based on keystroke latencies", Commun. ACM, vol. 33, no. 2, pp.168-176, 1990.
-
(1990)
Commun. ACM
, vol.33
, Issue.2
, pp. 168-176
-
-
Joyce, R.1
Gupta, G.2
-
21
-
-
34249913467
-
Retraining a keystroke dynamics-based authenticator with impostor patterns
-
H. Lee and S. Cho, "Retraining a keystroke dynamics-based authenticator with impostor patterns", Computers & Security, vol. 26, no. 4, pp.300-310, 2006.
-
(2006)
Computers & Security
, vol.26
, Issue.4
, pp. 300-310
-
-
Lee, H.1
Cho, S.2
-
22
-
-
38049180651
-
Keystroke pressure-based typing biometrics authentication system using support vector machines
-
Lecture Notes in Computer Science
-
W. Martono, H. Ali, and M. J. E. Salami, "Keystroke pressure-based typing biometrics authentication system using support vector machines," in Computational Science and Its Applications, pp.85-93, Lecture Notes in Computer Science 4706, 2007.
-
(2007)
Computational Science and Its Applications
, vol.4706
, pp. 85-93
-
-
Martono, W.1
Ali, H.2
Salami, M.J.E.3
-
23
-
-
0034140431
-
Keystroke dynamics as a biometric for authentication
-
F. Monrose and A. D. Rubin, "Keystroke dynamics as a biometric for authentication", Future Generation Computer Systems, vol. 16, no. 4, pp.351-359, 2000.
-
(2000)
Future Generation Computer Systems
, vol.16
, Issue.4
, pp. 351-359
-
-
Monrose, F.1
Rubin, A.D.2
-
24
-
-
0028423041
-
A multilayer neural network system for computer access security
-
M. S. Obaidat and S. Member, "A multilayer neural network system for computer access security", IEEE Transactions on System, Man, and Cybernetics, vol. 24, no. 5, pp.806-813, 1994.
-
(1994)
IEEE Transactions On System, Man, and Cybernetics
, vol.24
, Issue.5
, pp. 806-813
-
-
Obaidat, M.S.1
Member, S.2
-
25
-
-
0031121887
-
Verification of computer users using keystroke dynamics
-
M. S. Obaidat and B. Sadoun, "Verification of computer users using keystroke dynamics", IEEE Transactions on System, Man, and Cybernetics-Part B: Cybernetics, vol. 27, no. 2, pp.261-269, 1997.
-
(1997)
IEEE Transactions On System, Man, and Cybernetics-Part B: Cybernetics
, vol.27
, Issue.2
, pp. 261-269
-
-
Obaidat, M.S.1
Sadoun, B.2
-
26
-
-
79952420973
-
-
In Proceeding(s) of the IEEE Portuguese Conference on Artificial Intelligence
-
K. Revett, S. T. de Magalhães, and H. Santos, "Data mining a keystroke dynamics based biometrics database using rough sets", In Proceeding(s) of the IEEE Portuguese Conference on Artificial Intelligence, pp.188-191, 2005.
-
(2005)
Data Mining a Keystroke Dynamics Based Biometrics Database Using Rough Sets
, pp. 188-191
-
-
Revett, K.1
de Magalhães, S.T.2
Santos, H.3
-
27
-
-
33744949030
-
Enhancing login security through the use of keystroke input dynamics
-
Lecture Notes in Computer Science
-
K. Revett, S. T. de Magalhães, and H. M. D. Santos, "Enhancing login security through the use of keystroke input dynamics", in Advances in Biometrics, pp.661-667, Lecture Notes in Computer Science 3832, 2005.
-
(2005)
Advances In Biometrics
, vol.3832
, pp. 661-667
-
-
Revett, K.1
de Magalhães, S.T.2
Santos, H.M.D.3
-
28
-
-
38349018230
-
On the use of rough sets for user authentication via keystroke dynamics
-
Lecture Notes in Computer Science
-
K. Revett, S. T. de Magalhães, and H. M. D. Santos, "On the use of rough sets for user authentication via keystroke dynamics", in Progress in Artificial Intelligence, pp.145-159, Lecture Notes in Computer Science 4874, 2007.
-
(2007)
Progress In Artificial Intelligence
, vol.4874
, pp. 145-159
-
-
Revett, K.1
de Magalhães, S.T.2
Santos, H.M.D.3
-
29
-
-
0032021402
-
Computer users verification using login string keystroke dynamics
-
J. A. Robinson, V. M. Liang, J. A. Michael Chambers, and C. L. MacKenzie, "Computer users verification using login string keystroke dynamics", IEEE Transactions on System, Man, and Cybernetics-Part A: Systems and Humans, vol. 28, no. 2, pp. 236-241, 1998.
-
(1998)
IEEE Transactions On System, Man, and Cybernetics-Part A: Systems and Humans
, vol.28
, Issue.2
, pp. 236-241
-
-
Robinson, J.A.1
Liang, V.M.2
Chambers, J.A.M.3
Mackenzie, C.L.4
-
30
-
-
24644438726
-
A parallel decision tree-based method for user authentication based on keystroke patterns
-
Y. Sheng, V. V. Phoha, and S. M. Rovnyak, "A parallel decision tree-based method for user authentication based on keystroke patterns", IEEE Transactions on System, Man, and Cybernetics- Part B: Cybernetics, vol. 35, no. 4, pp.826-833, 2005.
-
(2005)
IEEE Transactions On System, Man, and Cybernetics- Part B: Cybernetics
, vol.35
, Issue.4
, pp. 826-833
-
-
Sheng, Y.1
Phoha, V.V.2
Rovnyak, S.M.3
-
31
-
-
57849147639
-
-
in Proceeding(s) of the IEEE Conference on Signal-Image Technologies and Internet- Based System
-
P. S. Teh, A. B. J. Teoh, T. S. Ong, and H. F. Neo, "Statistical fusion approach on keystroke dynamics," in Proceeding(s) of the IEEE Conference on Signal-Image Technologies and Internet- Based System, pp.918-923, 2008.
-
(2008)
Statistical Fusion Approach On Keystroke Dynamics
, pp. 918-923
-
-
Teh, P.S.1
Teoh, A.B.J.2
Ong, T.S.3
Neo, H.F.4
-
32
-
-
79952433568
-
Improvement on a Password Authentication Scheme for Multi-server Environments
-
Z. Tan, "Improvement on a Password Authentication Scheme for Multi-server Environments," JCIT: Journal of Convergence Information Technology, vol. 6, no. 1, pp. 218-228, 2011.
-
(2011)
JCIT: Journal of Convergence Information Technology
, vol.6
, Issue.1
, pp. 218-228
-
-
Tan, Z.1
-
33
-
-
79952424939
-
Cryptanalysis of Two ID Based Password Authentication Schemes for Multi-server Environments
-
Z. Tan, Cryptanalysis of Two ID Based Password Authentication Schemes for Multi-server Environments, JDCTA: International Journal of Digital Content Technology and its Applications, vol. 5, no. 1, pp. 87-94, 2011.
-
(2011)
JDCTA: International Journal of Digital Content Technology and Its Applications
, vol.5
, Issue.1
, pp. 87-94
-
-
Tan, Z.1
|