-
1
-
-
85175131897
-
-
Android dev phone 1. http://www.htc.com/www/product/dream/overview.html, 2010.
-
(2010)
Android Dev Phone 1
-
-
-
2
-
-
85175132627
-
-
url anonymized for submission
-
FANTASy project (url anonymized for submission). http://ANONYMIZED, 2010.
-
(2010)
FANTASy Project
-
-
-
3
-
-
85175130512
-
-
Public class sensorevent.http://developer.android.com/reference/android/ hardware/SensorEvent.html, 2010.
-
(2010)
Public Class Sensorevent
-
-
-
4
-
-
34547866131
-
2D and 3D face recognition: A survey
-
DOI 10.1016/j.patrec.2006.12.018, PII S0167865507000189, Image: Information and Control
-
A. F. Abatea, M. Nappi, D. Riccio, and G. Sabatino. 2D and 3D face recognition: A survey. Pattern Recognition Letters, 28(14):1885 - 1906, 2007. (Pubitemid 47259204)
-
(2007)
Pattern Recognition Letters
, vol.28
, Issue.14
, pp. 1885-1906
-
-
Abate, A.F.1
Nappi, M.2
Riccio, D.3
Sabatino, G.4
-
6
-
-
33750957079
-
Acoustic ear recognition for person identification
-
DOI 10.1109/AUTOID.2005.11, 1544428, Proceedings - Fourth IEEE Workshop on Automatic Identification Advanced Technologies, AUTO ID 2005
-
A. H. M. Akkermans, T. A. M. Kevenaar, and D. W. E. ant Schobben. Acoustic ear recognition for person identification. In AUTOID '05, pages 219-223, 2005. (Pubitemid 44733977)
-
(2005)
Proceedings - Fourth IEEE Workshop on Automatic Identification Advanced Technologies, AUTO ID 2005
, vol.2005
, pp. 219-223
-
-
Akkermans, A.H.M.1
Kevenaar, T.A.M.2
Schobben, D.W.E.3
-
7
-
-
84961346783
-
Smudge attacks on smartphone touch screens
-
A. J. Aviv, K. Gibson, E. Mossop, M. Blaze, and J. M. Smith. Smudge attacks on smartphone touch screens. In USENIX WOOT '10, 2010.
-
(2010)
USENIX WOOT '10
-
-
Aviv, A.J.1
Gibson, K.2
Mossop, E.3
Blaze, M.4
Smith, J.M.5
-
8
-
-
78650165017
-
User authentication through keystroke dynamics
-
F. Bergadano, D. Gunetti, and C. Picardi. User authentication through keystroke dynamics. ACM TISSEC, 5(4):367-397, 2002.
-
(2002)
ACM TISSEC
, vol.5
, Issue.4
, pp. 367-397
-
-
Bergadano, F.1
Gunetti, D.2
Picardi, C.3
-
11
-
-
33646811518
-
Identifying users of portable devices from gait pattern with accelerometers
-
M. Jani, L. Mikko, V. Elena, M. Satumarja, and A. Heikki. Identifying users of portable devices from gait pattern with accelerometers. In ICASSP '05, pages 973 - 976, 2005.
-
(2005)
ICASSP '05
, pp. 973-976
-
-
Jani, M.1
Mikko, L.2
Elena, V.3
Satumarja, M.4
Heikki, A.5
-
12
-
-
85084161999
-
The design and analysis of graphical passwords
-
I. Jermyn, A. Mayer, F. Monrose, M. K. Reiter, and A. D. Rubin. The design and analysis of graphical passwords. In USENIX SSYM'99, pages 1-1, 1999.
-
(1999)
USENIX SSYM'99
, pp. 1-1
-
-
Jermyn, I.1
Mayer, A.2
Monrose, F.3
Reiter, M.K.4
Rubin, A.D.5
-
13
-
-
0025384135
-
Identity authentication based on keystroke latencies
-
DOI 10.1145/75577.75582
-
R. Joyce and G. Gupta. Identity authentication based on keystroke latencies. Commun. ACM, 33(2):168-176, 1990. (Pubitemid 20657223)
-
(1990)
Communications of the ACM
, vol.33
, Issue.2
, pp. 168-176
-
-
Joyce Rick1
Gupta Gopal2
-
15
-
-
70450230583
-
User evaluation of lightweight user authentication with a single tri-axis accelerometer
-
J. Liu, L. Zhong, J. Wickramasuriya, and V. Vasudevan. User evaluation of lightweight user authentication with a single tri-axis accelerometer. In MobileHCI '09, pages 1-10, 2009.
-
(2009)
MobileHCI '09
, pp. 1-10
-
-
Liu, J.1
Zhong, L.2
Wickramasuriya, J.3
Vasudevan, V.4
-
16
-
-
85175130285
-
-
J. Mantyjarvi, M. Lindholm, E. Vildjiounaite, S.-M. Makela, and H. Ailisto. Identifying users of portable devices from gait pattern with accelerometers. 5779(7), 2005.
-
Identifying Users of Portable Devices from Gait Pattern with Accelerometers
, vol.5779
, Issue.7
, pp. 2005
-
-
Mantyjarvi, J.1
Lindholm, M.2
Vildjiounaite, E.3
Makela, S.-M.4
Ailisto, H.5
-
17
-
-
0042781070
-
Voice biometrics
-
J. A. Markowitz. Voice biometrics. Commun. ACM, 43(9):66-73, 2000.
-
(2000)
Commun. ACM
, vol.43
, Issue.9
, pp. 66-73
-
-
Markowitz, J.A.1
-
18
-
-
35148850096
-
A multi-matcher for ear authentication
-
DOI 10.1016/j.patrec.2007.07.004, PII S0167865507002280
-
L. Nanni and A. Lumini. A multi-matcher for ear authentication. Pattern Recognition Letters, 28(16):2219-2226, 2007. (Pubitemid 47538777)
-
(2007)
Pattern Recognition Letters
, vol.28
, Issue.16
, pp. 2219-2226
-
-
Nanni, L.1
Lumini, A.2
-
19
-
-
39149106769
-
On predictive models and user-drawn graphical passwords
-
P. C. v. Oorschot and J. Thorpe. On predictive models and user-drawn graphical passwords. ACM TISSEC, 10(4):1-33, 2008.
-
(2008)
ACM TISSEC
, vol.10
, Issue.4
, pp. 1-33
-
-
Oorschot, P.C.V.1
Thorpe, J.2
-
20
-
-
0033888070
-
An introduction to evaluating biometric systems
-
P. J. Phillips, A. Martin, C. l. Wilson, and M. Przybocki. An introduction to evaluating biometric systems. Computer, 33(2):56-63, 2000.
-
(2000)
Computer
, vol.33
, Issue.2
, pp. 56-63
-
-
Phillips, P.J.1
Martin, A.2
Wilson, C.L.3
Przybocki, M.4
-
21
-
-
84979911620
-
Multimodal biometrics: An overview
-
A. Ross and A. Jain. Multimodal biometrics: an overview. In EUSPICO '05, pages 1221-1224, 2005.
-
(2005)
EUSPICO '05
, pp. 1221-1224
-
-
Ross, A.1
Jain, A.2
-
23
-
-
15544379982
-
Fast and exact warping of time series using adaptive segmental approximations
-
DOI 10.1007/s10994-005-5828-3
-
Y. Shou, N. Mamoulis, and D. W. Cheung. Fast and exact warping of time series using adaptive segmental approximations. Mach. Learn., 58(2-3):231-267, 2005. (Pubitemid 40400639)
-
(2005)
Machine Learning
, vol.58
, Issue.2-3
, pp. 231-267
-
-
Shou, Y.1
Mamoulis, N.2
Cheung, D.3
|