-
2
-
-
85001819535
-
On the design of an authentication system based on keystroke dynamics using a predefined input text
-
D. Bartmann, I. Bakdi and M. Achatz, "On the design of an authentication system based on keystroke dynamics using a predefined input text," International Journal of Information Security and Privacy, vol. 2, pp. 1-12, 2007.
-
(2007)
International Journal of Information Security and Privacy
, vol.2
, pp. 1-12
-
-
Bartmann, D.1
Bakdi, I.2
Achatz, M.3
-
3
-
-
78650165017
-
User authentication through keystroke dynamics
-
F. Bergando, D. Gunetti and C. Picardi, "User authentication through keystroke dynamics," ACM TISSEC, vol. 4, pp. 367-397, 2002.
-
(2002)
ACM TISSEC
, vol.4
, pp. 367-397
-
-
Bergando, F.1
Gunetti, D.2
Picardi, C.3
-
5
-
-
15944384177
-
-
Accessed 24 July 2010
-
Biometric Evaluation Methodology Working Group, "Biometric evaluation methodology," 2002. http://www.cesg.gov.uk/policy-technologies/ biometrics/media/bem-10.pdf. Accessed 24 July 2010.
-
(2002)
Biometric Evaluation Methodology
-
-
-
9
-
-
58149234656
-
Software as a service
-
P. Buxmann, P. and T. Hess, "Software as a Service," Wirtschaftsinformatik, vol. 6, pp. 500-503, 2008.
-
(2008)
Wirtschaftsinformatik
, vol.6
, pp. 500-503
-
-
Buxmann, P.P.1
Hess, T.2
-
10
-
-
33744960056
-
Keystroke biometric system using wavelets
-
D. Zhang and A. K. Jain, eds. Springer
-
W. Chang, "Keystroke biometric system using wavelets," in ICB 2006, D. Zhang and A. K. Jain, eds. Springer, pp. 647-654, 2006.
-
(2006)
ICB 2006
, pp. 647-654
-
-
Chang, W.1
-
11
-
-
33845255668
-
Sicherheit in der Informationstechnik. Der Begriff ITSicherheit
-
R. Dierstein, "Sicherheit in der Informationstechnik. Der Begriff ITSicherheit," Informatik Spektrum, vol. 4, pp. 343-353, 2004.
-
(2004)
Informatik Spektrum
, vol.4
, pp. 343-353
-
-
Dierstein, R.1
-
14
-
-
80455168953
-
Software as a Service (SaaS): Rechtliche Rahmenbedingungen
-
C. Köhler-Schulte, ed. Springer
-
J. Eckhardt, "Software as a Service (SaaS): Rechtliche Rahmenbedingungen," in Software as a Service, C. Köhler-Schulte, ed. Springer, pp. 114-139, 2009.
-
(2009)
Software As A Service
, pp. 114-139
-
-
Eckhardt, J.1
-
15
-
-
45949112145
-
-
Accessed 30 May 2011
-
J. Fenn, "Hype Cycle for Emerging Technologies" 2010. http://community.mis.temple.edu/mis2501sec001s11/files/2011/01/ Hype-Cycle-for-Emerging-Technologies-2010.pdf. Accessed 30 May 2011.
-
(2010)
Hype Cycle for Emerging Technologies
-
-
Fenn, J.1
-
18
-
-
33745215614
-
Keystroke analysis of free text
-
DOI 10.1145/1085126.1085129
-
D. Gunetti and C. Picardi, "Keystroke Analysis of Free Text," ACM TISSEC, vol. 3, pp. 312-347, 2005. (Pubitemid 43906388)
-
(2005)
ACM Transactions on Information and System Security
, vol.8
, Issue.3
, pp. 312-347
-
-
Gunetti, D.1
Picardi, C.2
-
19
-
-
33745198933
-
Keystroke analysis of different languages: A case study
-
Springer
-
D. Gunetti, C. Picardi, C. and G. Ruffo, "Keystroke analysis of different languages: a case study," In Proc. of IDA (IDA 2005), Springer, pp. 133-144, 2005.
-
(2005)
Proc. of IDA (IDA 2005)
, pp. 133-144
-
-
Gunetti, D.1
Picardi, C.C.2
Ruffo, G.3
-
20
-
-
73149108190
-
SeAAS - A reference architecture for security services in SOA
-
M. Hafner, M. Mukhtiar and R. Breu, "SeAAS - A reference architecture for security services in SOA," J. UCS, vol. 15, pp. 2916-2936, 2009.
-
(2009)
J. UCS
, vol.15
, pp. 2916-2936
-
-
Hafner, M.1
Mukhtiar, M.2
Breu, R.3
-
21
-
-
37849023553
-
User classification for keystroke dynamics authentication
-
S. W. Lee and S. Z. Li, eds. Springer
-
S. Hocquet, J. Ramel and H. Cardot, "User Classification for Keystroke Dynamics Authentication," in: ICB 2007, S. W. Lee and S. Z. Li, eds. Springer, pp. 531-539, 2007.
-
(2007)
ICB 2007
, pp. 531-539
-
-
Hocquet, S.1
Ramel, J.2
Cardot, H.3
-
24
-
-
80455133092
-
-
International Biometric Group (IBG), IBG
-
International Biometric Group (IBG), "State of Biometric Standards," IBG, 2009.
-
(2009)
State of Biometric Standards
-
-
-
25
-
-
78149472443
-
Introduction to biometric recognition
-
A. Jain, P. Flynn and A. Ross, eds. Springer
-
A. Jain and A. Ross, "Introduction to Biometric Recognition," in Handbook of Biometrics, A. Jain, P. Flynn and A. Ross, eds. Springer, pp. 1-22, 2007.
-
(2007)
Handbook of Biometrics
, pp. 1-22
-
-
Jain, A.1
Ross, A.2
-
26
-
-
37849044963
-
Keystroke dynamics in a general setting
-
S. W. Lee and S. Z. Li, eds. Springer
-
R. Janakiraman and T. Sim, "Keystroke Dynamics in a General Setting," in ICB 2007, S. W. Lee and S. Z. Li, eds. Springer, pp. 584-593, 2007.
-
(2007)
ICB 2007
, pp. 584-593
-
-
Janakiraman, R.1
Sim, T.2
-
27
-
-
71749097049
-
A systematic process for developing high quality SaaS cloud services
-
M. G. Jaatun and C Rong, eds. Springer
-
H. La and S. Kim, "A systematic process for developing high quality SaaS cloud services," in CloudCom 2009, M. G. Jaatun and C Rong, eds. Springer, pp. 278-289, 2009.
-
(2009)
CloudCom 2009
, pp. 278-289
-
-
La, H.1
Kim, S.2
-
34
-
-
33744952566
-
GA SVM wrapper ensemble for keystroke dynamics authentication
-
Advances in Biometrics - International Conference, ICB 2006, Proceedings
-
K. Sung and S. Cho, "GA SVM wrapper ensemble for keystroke dynamics authentication,". in ICB 2006, D. Zhang and A. K. Jain, eds. Springer, pp. 654-660, 2006. (Pubitemid 43856430)
-
(2006)
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
, vol.LNCS3832
, pp. 654-660
-
-
Sung, K.-S.1
Cho, S.2
-
35
-
-
70349237750
-
Using quantified trust levels to describe authentication requirements in federated identity management
-
Virginia, E. Damiani and S. Proctor, Eds. ACM Press
-
I. Thomas, M. Menzel, and C. Meinel, "Using quantified trust levels to describe authentication requirements in federated identity management," Proceedings of the 2008 ACM Workshop on Secure Web Services. October 31, 2008, Alexandria, Virginia, E. Damiani and S. Proctor, Eds. ACM Press, pp. 71-80, 2008.
-
(2008)
Proceedings of the 2008 ACM Workshop on Secure Web Services. October 31, 2008, Alexandria
, pp. 71-80
-
-
Thomas, I.1
Menzel, M.2
Meinel, C.3
-
38
-
-
84902241182
-
Cloud computing und datenschutz
-
T. Weichert, "Cloud Computing und Datenschutz," DuD, vol. 10, 2010.
-
(2010)
DuD
, vol.10
-
-
Weichert, T.1
-
39
-
-
74849096440
-
Anonymous biometric access control
-
S. Ye, Y. Luo, J. Zhao and S. C. Cheung, "Anonymous biometric access control," EURASIP Journal on Information Security, vol. 2009, 2009.
-
(2009)
EURASIP Journal on Information Security
, vol.2009
-
-
Ye, S.1
Luo, Y.2
Zhao, J.3
Cheung, S.C.4
|