-
3
-
-
77954135455
-
SecurePhone: A mobile phone with biometric authentication and e-signature support for dealing secure transactions on the fly
-
R. Ricci, et al. "SecurePhone: a mobile phone with biometric authentication and e-signature support for dealing secure transactions on the fly", Int. Conf. on Security and Cryptography, 2006.
-
Int. Conf. on Security and Cryptography, 2006
-
-
Ricci, R.1
-
5
-
-
33845565502
-
Pupil and Iris Localization for Iris Recognition in Mobile Phones
-
D.-h. Cho, K.R. Park, D.W. Rhee, Y. Kim, J. Yang, "Pupil and Iris Localization for Iris Recognition in Mobile Phones", Int. Conf. on Software Engineering, Artificial Intelligence, Networking, and Parallel/Distributed Computing , 2006.
-
Int. Conf. on Software Engineering, Artificial Intelligence, Networking, and Parallel/Distributed Computing, 2006
-
-
Cho, D.-H.1
Park, K.R.2
Rhee, D.W.3
Kim, Y.4
Yang, J.5
-
6
-
-
0025541584
-
Computer-access security systems using keystroke dynamics
-
S. Bleha, C. Slivinsky, B. Hussien, "Computer-access security systems using keystroke dynamics", IEEE Trans. on Pattern Analysis and Machine Intelligence, No. 12, pp. 1217U{combining double acute accent}-1222, 1990.
-
(1990)
IEEE Trans. on Pattern Analysis and Machine Intelligence
, Issue.12
-
-
Bleha, S.1
Slivinsky, C.2
Hussien, B.3
-
7
-
-
0031121887
-
Verification of computer users using keystroke dynamics
-
M. Obaidat and B. Sadoun, "Verification of computer users using keystroke dynamics", IEEE Trans. on Systems, Man, and Cybernetics, Part B, Vol. 27, No. 2, pp. 261-269, 1997.
-
(1997)
IEEE Trans. on Systems, Man, and Cybernetics, Part B
, vol.27
, Issue.2
, pp. 261-269
-
-
Obaidat, M.1
Sadoun, B.2
-
8
-
-
0034140431
-
Keystroke dynamics as a biometric for authentication
-
F. Monrose, A. D. Rubin, "Keystroke dynamics as a biometric for authentication", Future Generation Computer Systems, Vol. 16, No. 4, pp. 351-359, 2000.
-
(2000)
Future Generation Computer Systems
, vol.16
, Issue.4
, pp. 351-359
-
-
Monrose, F.1
Rubin, A.D.2
-
9
-
-
78650154214
-
A Survey of Biometric keystroke Dynamics: Approaches, Security and Challenges
-
D. Shanmugapriya, G. Padmavathi, "A Survey of Biometric keystroke Dynamics: Approaches, Security and Challenges", Int. J. of Computer Science and Information Security, Vol. 5, No. 1, pp: 115-119, 2009.
-
(2009)
Int. J. of Computer Science and Information Security
, vol.5
, Issue.1
, pp. 115-119
-
-
Shanmugapriya, D.1
Padmavathi, G.2
-
10
-
-
12844274372
-
Typing Patterns: A Key to User Identification
-
A. Peacock, X. Ke, and M. Wilkerson, "Typing Patterns: A Key to User Identification", IEEE Security & Privacy, pp. 40-43, 2004.
-
(2004)
IEEE Security & Privacy
, pp. 40-43
-
-
Peacock, A.1
Ke, X.2
Wilkerson, M.3
-
11
-
-
56049086396
-
Gaussian mixture modeling of keystroke patterns for biometric applications
-
Nov.
-
D. Hosseinzadeh, S. Krishnan, "Gaussian mixture modeling of keystroke patterns for biometric applications" IEEE Trans. on Systems, Man, and Cybernetics, Part C, Vol. 38, No. 6, pp. 816-826, Nov. 2008.
-
(2008)
IEEE Trans. on Systems, Man, and Cybernetics, Part C
, vol.38
, Issue.6
, pp. 816-826
-
-
Hosseinzadeh, D.1
Krishnan, S.2
-
12
-
-
71749104688
-
Keystroke Dynamics with Low Constraints SVM Based Passphrase Enrollment
-
R. Giot, M. El-Abed, C. Rosenberger, "Keystroke Dynamics With Low Constraints SVM Based Passphrase Enrollment", IEEE Third Int. Conf. on Biometrics: Theory, Applications and Systems (BTAS), Wash. DC USA, Sept. 28-30, 2009
-
IEEE Third Int. Conf. on Biometrics: Theory, Applications and Systems (BTAS), Wash. DC USA, Sept. 28-30, 2009
-
-
Giot, R.1
El-Abed, M.2
Rosenberger, C.3
-
16
-
-
3943091227
-
Keystroke Dynamics on a Mobile Handset: A Feasibility Study
-
N. L. Clarke, S. M. Furnell, B. M. Lines, P.L. Reynolds "Keystroke Dynamics on a Mobile Handset: A Feasibility Study", Information Management and Computer Security, Vol. 11, No. 4, pp. 161-166, 2003.
-
(2003)
Information Management and Computer Security
, vol.11
, Issue.4
, pp. 161-166
-
-
Clarke, N.L.1
Furnell, S.M.2
Lines, B.M.3
Reynolds, P.L.4
-
17
-
-
33845701766
-
Authentication mobile phone users using keystroke analysis
-
N. L. Clarke, S. M. Furnell, "Authentication mobile phone users using keystroke analysis", Int. J. of Information Security, Vol. 6, No. 6, pp. 1-14, 2007.
-
(2007)
Int. J. of Information Security
, vol.6
, Issue.6
, pp. 1-14
-
-
Clarke, N.L.1
Furnell, S.M.2
-
20
-
-
67651146720
-
User authentication using keystroke dynamics for cellular phones
-
P. Campisi, E. Maiorana, M. Lo Bosco, A. Neri, "User authentication using keystroke dynamics for cellular phones", IET Signal Processing, Vol. 3, No. 4, pp. 333-341, 2009.
-
(2009)
IET Signal Processing
, vol.3
, Issue.4
, pp. 333-341
-
-
Campisi, P.1
Maiorana, E.2
Lo Bosco, M.3
Neri, A.4
-
21
-
-
57849163559
-
Keystroke dynamics-based authentication for mobile devices
-
S.-s. Hwang, S. Cho, S. Park, "Keystroke dynamics-based authentication for mobile devices", Elsevier Computers & Security, Vol. 28, No. 1-2, pp: 85-93, 2009.
-
(2009)
Elsevier Computers & Security
, vol.28
, Issue.1-2
, pp. 85-93
-
-
Hwang, S.-S.1
Cho, S.2
Park, S.3
-
23
-
-
2442602175
-
Biometric Template Selection and Update: A Case Study in Fingerprints
-
U. Uludag, A. Ross, A. K. Jain, "Biometric Template Selection and Update: A Case Study in Fingerprints", Pattern Recognition, Vol. 37, No. 7, pp. 1533-1542, 2004.
-
(2004)
Pattern Recognition
, vol.37
, Issue.7
, pp. 1533-1542
-
-
Uludag, U.1
Ross, A.2
Jain, A.K.3
-
24
-
-
62449203219
-
Score Based Biometric Template Selection and Update
-
Y. Li, J. Yin, E. Zhu, C. Hu, H. Chen, "Score Based Biometric Template Selection and Update", Int. Conf. on Future Generation Comm. and Networking, 2008.
-
Int. Conf. on Future Generation Comm. and Networking, 2008
-
-
Li, Y.1
Yin, J.2
Zhu, E.3
Hu, C.4
Chen, H.5
-
26
-
-
29144517863
-
A Clustering Method for Automatic Biometric Template Selection
-
A. Lumini, L. Nanni, "A Clustering Method for Automatic Biometric Template Selection", Pattern Recognition, Vol. 39, pp. 495-497, 2006.
-
(2006)
Pattern Recognition
, vol.39
, pp. 495-497
-
-
Lumini, A.1
Nanni, L.2
-
27
-
-
25844484205
-
Identity authentication using improved online signature verification method
-
DOI 10.1016/j.patrec.2005.04.017, PII S0167865505001376
-
A. Kholmatov, B. Yanikoglu, "Identity Authentication Using Improved Online Signature Verification Method", Pattern Recognition Letters, Vol. 26, No. 15, pp: 2400-2408, 2005. (Pubitemid 41394296)
-
(2005)
Pattern Recognition Letters
, vol.26
, Issue.15
, pp. 2400-2408
-
-
Kholmatov, A.1
Yanikoglu, B.2
-
28
-
-
33744965791
-
Biometric access control through numerical keyboards based on keystroke dynamics
-
Advances in Biometrics - International Conference, ICB 2006, Proceedings
-
R.N. Rodrigues et al., "Biometric Access Control Through Numerical Keyboards Based on Keystroke Dynamics", Lecture Notes in Computer Science, Vol. 3832, pp: 640-646, 2005. (Pubitemid 43856428)
-
(2006)
Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
, vol.3832 LNCS
, pp. 640-646
-
-
Rodrigues, R.N.1
Yared, G.F.G.2
Costa, C.R.D.N.3
Yabu-Uti, J.B.T.4
Violaro, F.5
Ling, L.L.6
|