메뉴 건너뛰기




Volumn , Issue , 2006, Pages 167-182

A visuo-biometric authentication mechanism for older users

Author keywords

Authentication; Biometrics; Elderly users; Risk; Security; Visual

Indexed keywords

BIOMETRICS; RISK ANALYSIS; RISK ASSESSMENT; RISKS; WEBSITES;

EID: 79959966395     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1007/1-84628-249-7_11     Document Type: Conference Paper
Times cited : (27)

References (35)
  • 1
    • 34547467347 scopus 로고    scopus 로고
    • Usability research for the elderly people
    • Akatsu, H. & Miki, H. [2004], Usability Research for the Elderly People, Oki Technical Review 71(3).
    • (2004) Oki Technical Review , vol.71 , Issue.3
    • Akatsu, H.1    Miki, H.2
  • 2
    • 0036131436 scopus 로고    scopus 로고
    • Visually and motor-based knowledge of letters: Evidence from a pure alexia patient
    • Bartomoleo, P, Bachoud-Lévi, A.-C, Chokron, S. & Degos, J.-D. [2002], Visually and Motor-based Knowledge of Letters: Evidence from a Pure Alexia Patient, Neurosychologica 40(8), 1363-71.
    • (2002) Neurosychologica , vol.40 , Issue.8 , pp. 1363-1371
    • Bartomoleo, P.1    Bachoud-Lévi, A.-C.2    Chokron, S.3    Degos, J.-D.4
  • 3
  • 4
    • 84962052143 scopus 로고    scopus 로고
    • Identity theft, social security numbers, and the web
    • Berghel, H. [2000], Identity Theft, Social Security Numbers, and the Web, Communications of the ACM 43(2111-21.
    • (2000) Communications of the ACM , vol.43 , pp. 2111-2121
    • Berghel, H.1
  • 5
    • 79955925687 scopus 로고    scopus 로고
    • last accessed 2005-04-13
    • Braghin, C. [2000], Biometric Authentication. Available at http://citeseer.ist.psu.edu/436492.html (last accessed 2005-04-13).
    • (2000) Biometric Authentication
    • Braghin, C.1
  • 8
    • 84864052708 scopus 로고    scopus 로고
    • Social engineering: A tip of the iceberg
    • Damle, P. [2002], Social Engineering: A Tip of the Iceberg, Information Systems Control Journal 2. http://www.isaca.org/Template.cfm?Section= Archives&CONTENTID=17032&TEMPLATE=/ContentManagement/ContentDisplay.cfm.
    • (2002) Information Systems Control Journal , vol.2
    • Damle, P.1
  • 10
    • 85084161493 scopus 로고    scopus 로고
    • Déjà vu: A user study using images for authentication
    • Denver, Colorado
    • Dhamija, R. & Perrig, A. [2000], Déjà vu: A User Study Using Images for Authentication, in Proceedings of 9th USENIX Security Symposium, The USENDC Association,Denver, Colorado, pp.45-58. http://www.usenix.org/events/sec2000/fulLpapers/dhaniija/dhamija.pdf.
    • (2000) Proceedings of 9th USENIX Security Symposium , pp. 45-58
    • Dhamija, R.1    Perrig, A.2
  • 13
    • 33745910352 scopus 로고    scopus 로고
    • Global aging
    • JANUARY 31
    • Engardio, R & Matlack, C. [2005], Global Aging. Business Week, JANUARY 31, http://www.businessweek.com/magazine/content/05-05/b3918011.htm.
    • (2005) Business Week
    • Engardio, R.1    Matlack, C.2
  • 16
    • 84864045656 scopus 로고    scopus 로고
    • Design of smart card systems to meet the needs of disabled and elderly persons
    • Gill, J. [2004], Design of Smart Card Systems to Meet the Needs of Disabled and Elderly Persons. Tiresias.org Scientific and Technological Reports, http://www.tiresias.org/reports/ecart.htm.
    • (2004) Tiresias.org Scientific and Technological Reports
    • Gill, J.1
  • 18
    • 0035846641 scopus 로고    scopus 로고
    • Recognition of familiar handwriting in stroke and dementia
    • Heckman, J. G., Lang, C. J. & Neundorfer, B. [2001], Recognition of Familiar Handwriting in Stroke and Dementia, Neurology 57(11), 2128-31.
    • (2001) Neurology , vol.57 , Issue.11 , pp. 2128-2131
    • Heckman, J.G.1    Lang, C.J.2    Neundorfer, B.3
  • 19
    • 84864031317 scopus 로고    scopus 로고
    • IASEP. Purdue Research Foundation, Center for Information Assurance and Security and the Indiana Assessment System of Education Proficiencies
    • IASEP [2000], Data Security Protocol for Education, http://iasep.soe. purdue.edu/Protocol/home-page.htm. Center for Information Assurance and Security and the Indiana Assessment System of Education Proficiencies. Purdue Research Foundation.
    • (2000) Data Security Protocol for Education
  • 21
    • 84864045661 scopus 로고    scopus 로고
    • The importance of being secure: The ROI of web security
    • Leonard, K. [2003], The Importance of Being Secure: The ROI of Web Security, Information Systems Control Journal 5. http://www.isaca.org/Template. cfm?Section=Archives&CONTENTID=16729&TEMPLATE=/ContentManagement/ ContentDisplay.cfm.
    • (2003) Information Systems Control Journal , vol.5
    • Leonard, K.1
  • 22
    • 0042425758 scopus 로고    scopus 로고
    • Visual presentation of single letters activates a premotor area involved in writing
    • Longcamp, M., Anton, J. L., Roth, M. & Velay, J. L. [2003], Visual Presentation of Single Letters Activates a Premotor Area Involved in Writing, Neuroimage 19(4), 1492-500.
    • (2003) Neuroimage , vol.19 , Issue.4 , pp. 1492-1500
    • Longcamp, M.1    Anton, J.L.2    Roth, M.3    Velay, J.L.4
  • 23
    • 0031857137 scopus 로고    scopus 로고
    • Postal surveys versus electronic mail surveys. The tortoise and the hare revisited
    • Mavis, B. E. & Brocato, J. J. [1998], Postal Surveys versus Electronic Mail Surveys. The Tortoise and the Hare Revisited, Evaluation & The Health Professions 21(3), 395-408.
    • (1998) Evaluation & the Health Professions , vol.21 , Issue.3 , pp. 395-408
    • Mavis, B.E.1    Brocato, J.J.2
  • 24
    • 84864047895 scopus 로고    scopus 로고
    • Miller, J. C. [2000], Risk Assessment for your Web Site, http://www.irmi.com/irmicom/expert/articles/2000/schoenfeld09.aspx. IRMLcom. International Risk Management Institute.
    • (2000) Risk Assessment for Your Web Site
    • Miller, J.C.1
  • 26
    • 9944240263 scopus 로고    scopus 로고
    • My password is here! An investigation into visuospatial authentication mechanisms
    • Renaud, K. & De Angeli, A. [2004], My Password is Here! An Investigation into Visuospatial Authentication Mechanisms, Interacting with Computers 16(6), 1017-41.
    • (2004) Interacting with Computers , vol.16 , Issue.6 , pp. 1017-1041
    • Renaud, K.1    De Angeli, A.2
  • 27
    • 33751109662 scopus 로고    scopus 로고
    • Quantification of authentication mechanisms - A usabiuty perspective
    • Renaud, K. V. [2004], Quantification of Authentication Mechanisms - A UsabiUty Perspective, Journal of Web Engineering 3(2), 95-123.
    • (2004) Journal of Web Engineering , vol.3 , Issue.2 , pp. 95-123
    • Renaud, K.V.1
  • 28
    • 84864045659 scopus 로고    scopus 로고
    • Risk assessment tools: A primer
    • Schreider, T. [2003], Risk Assessment Tools: A Primer, Information Systems Control Journal 2. http://www.isaca.org/TemplateRedirect.cfm?template=/ ContentManagement/ContentDisplay.cfm&ContentID=16222.
    • (2003) Information Systems Control Journal , vol.2
    • Schreider, T.1
  • 29
    • 0029042494 scopus 로고
    • The efficacy of kinesthetic reading treatment for pure alexia
    • Seki, K., Yajima, M. & Sugishita, M. [1995], The Efficacy of Kinesthetic Reading Treatment for Pure Alexia, Neuropsychologica 33(5), 595-609.
    • (1995) Neuropsychologica , vol.33 , Issue.5 , pp. 595-609
    • Seki, K.1    Yajima, M.2    Sugishita, M.3
  • 32
    • 0035600051 scopus 로고    scopus 로고
    • Theory of time preference
    • Trostel, P A. & Taylor, G. A. [2001], Theory of Time Preference, Economic Inquiry 39(3), 379-95.
    • (2001) Economic Inquiry , vol.39 , Issue.3 , pp. 379-395
    • Trostel, P.A.1    Taylor, G.A.2
  • 33
    • 84864031318 scopus 로고    scopus 로고
    • Fighting security breaches and cyberattacks with twofactor authentication technology
    • Walker, T [2001], Fighting Security Breaches and Cyberattacks with Twofactor Authentication Technology, Information Systems Control Journal 2. http://www.isaca.org/TemplateRedirect.cfm?template=/ContentManagement/ ContentDisplay.cfm&ContentID=17187.
    • (2001) Information Systems Control Journal , vol.2
    • Walker, T.1
  • 34
    • 34547490844 scopus 로고    scopus 로고
    • Secure authentication schemes suitable for an associative memory
    • Leibniz Center for Research in Computer Science
    • Weinshall, D. [2004], Secure Authentication Schemes suitable for an Associative Memory, Technical Report TR 2004-30, Hebrew University, Leibniz Center for Research in Computer Science.
    • (2004) Technical Report TR 2004-30, Hebrew University
    • Weinshall, D.1
  • 35
    • 0020433741 scopus 로고
    • Do we see what makes our script characteristic - Or do we only feel it? Modes of sensory control in handwriting
    • Zimmer, A. [1982], Do We See What Makes Our Script Characteristic - Or Do We Only Feel It? Modes of Sensory Control in Handwriting, Psychological Research 44(2).
    • (1982) Psychological Research , vol.44 , Issue.2
    • Zimmer, A.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.