-
2
-
-
34547965365
-
A new biometrie technology based on mouse dynamics
-
DOI 10.1109/TDSC.2007.70207
-
A. A. E. Ahmed and I. Traore. A new biometric technology based on mouse dynamics. IEEE Transactions on Dependable and Secure Computing, 4(3):165-179, 2007. (Pubitemid 47274809)
-
(2007)
IEEE Transactions on Dependable and Secure Computing
, vol.4
, Issue.3
, pp. 165-179
-
-
Ahmed, A.A.E.1
Traore, I.2
-
3
-
-
84876806083
-
Biometric authentication revisited: Understanding the impact of wolves in sheep's clothing
-
L. Ballard, F. Monrose, and D. Lopresi. Biometric authentication revisited: Understanding the impact of wolves in sheep's clothing. In USENIX Security Symposium, 2006.
-
(2006)
USENIX Security Symposium
-
-
Ballard, L.1
Monrose, F.2
Lopresi, D.3
-
5
-
-
80755145276
-
An enhanced keystroke biometric system and associated studies
-
C4.2-C4.7
-
T. Buch, A. Cotoranu, E. Jeskey, et al. An enhanced keystroke biometric system and associated studies. In Proceedings of Student-Faculty Research Day, CSIS, Pace University, pages C4.2-C4.7, 2008.
-
(2008)
Proceedings of Student-faculty Research Day, CSIS, Pace University
-
-
Buch, T.1
Cotoranu, A.2
Jeskey, E.3
-
7
-
-
74049149728
-
Multiple password interference in text passwords and click-based graphical passwords
-
S. Chiasson, A. Forget, E. Stobert, P. van Oorschot, and R. Biddle. Multiple password interference in text passwords and click-based graphical passwords. In ACM Conference on Computer and Communications Security (CCS), 2009.
-
(2009)
ACM Conference on Computer and Communications Security (CCS)
-
-
Chiasson, S.1
Forget, A.2
Stobert, E.3
Van Oorschot, P.4
Biddle, R.5
-
13
-
-
27944460383
-
Efficient fingerprint-based user authentication for embedded systems
-
14.5, Proceedings 2005, 42nd Design Automation Conference, DAC 2005
-
P. Gupta, S. Ravi, A. Raghunathan, and N. K. Jha. Efficient fingerprint-based user authentication for embedded systems. In Proceedings of the 42nd annual Design Automation Conference (DAC), pages 244-247, 2005. (Pubitemid 41675437)
-
(2005)
Proceedings - Design Automation Conference
, pp. 244-247
-
-
Gupta, P.1
Ravi, S.2
Raghunathan, A.3
Jha, N.K.4
-
14
-
-
84957069814
-
Text Categorization with Support Vector Machines: Learning with many Relevant Features
-
Machine Learning: ECML-98
-
T. Joachims. Text categorization with support vector machines: Learning with many relevant features. In Proc. of European Conference on Machine Learning, pages 137-142, 1998. (Pubitemid 128067178)
-
(1998)
Lecture Notes in Computer Science
, Issue.1398
, pp. 137-142
-
-
Joachims, T.1
-
16
-
-
78249240878
-
Why did my detector do that?!: Predicting keystroke-dynamics error rates
-
K. Killourhy and R. Maxion. Why did my detector do that?!: predicting keystroke-dynamics error rates. In Proceedings of RAID'10, pages 256-276, 2010.
-
(2010)
Proceedings of RAID'10
, pp. 256-276
-
-
Killourhy, K.1
Maxion, R.2
-
17
-
-
34147206388
-
RUI: Recording user input from interfaces under windows and mac os x
-
U. Kukreja, W. E. Stevenson, and F. E. Ritter. RUI: Recording user input from interfaces under windows and mac os x. Behavior Research Methods, 38(4):656-659, 2006.
-
(2006)
Behavior Research Methods
, vol.38
, Issue.4
, pp. 656-659
-
-
Kukreja, U.1
Stevenson, W.E.2
Ritter, F.E.3
-
18
-
-
80755145273
-
Online face detection and user authentication
-
C. Mallauran, J.-L. Dugelay, F. Perronnin, and C. Garcia. Online face detection and user authentication. In Proceedings of the 13th annual ACM international conference on Multimedia (MM), pages 219-220, 2005.
-
(2005)
Proceedings of the 13th Annual ACM International Conference on Multimedia (MM)
, pp. 219-220
-
-
Mallauran, C.1
Dugelay, J.-L.2
Perronnin, F.3
Garcia, C.4
-
21
-
-
77958105748
-
Improving mouse dynamics biometric performance using variance reduction via extractors with separate features
-
Y. Nakkabi, I. Traore, and A. A. E. Ahmed. Improving mouse dynamics biometric performance using variance reduction via extractors with separate features. IEEE Transactions on Systems, Man, and Cybernetics, 40(6):1345-1353, 2010.
-
(2010)
IEEE Transactions on Systems, Man, and Cybernetics
, vol.40
, Issue.6
, pp. 1345-1353
-
-
Nakkabi, Y.1
Traore, I.2
Ahmed, A.A.E.3
-
23
-
-
12844274372
-
Typing patterns: A key to user identification
-
DOI 10.1109/MSP.2004.89
-
A. Peacok, X. Ke, and M. Wilkerson. Typing patterns: A key to user identification. IEEE Security and Privacy, 2(5):40-47, 2004. (Pubitemid 40168625)
-
(2004)
IEEE Security and Privacy
, vol.2
, Issue.5
, pp. 40-47
-
-
Peacock, A.1
Ke, X.2
Wilkerson, M.3
-
25
-
-
84863469085
-
Stronger password authentication using browser extensions
-
B. Ross, C. Jackson, N. Miyake, D. Boneh, and J. Mitchell. Stronger password authentication using browser extensions. In USENIX Security Symposium, 2005.
-
(2005)
USENIX Security Symposium
-
-
Ross, B.1
Jackson, C.2
Miyake, N.3
Boneh, D.4
Mitchell, J.5
-
31
-
-
70350234989
-
Behavioural biometrics: A survey and classification
-
R. V. Yampolskiy and V. Govindaraju. Behavioural biometrics: a survey and classification. Int. J. Biometrics, 1(1):81-113, 2008.
-
(2008)
Int. J. Biometrics
, vol.1
, Issue.1
, pp. 81-113
-
-
Yampolskiy, R.V.1
Govindaraju, V.2
|