-
4
-
-
33744948471
-
Iris recognition in mobile phone based on adaptive gabor filter
-
Zhang, D., Jain, A. (eds.) Springer, Heidelberg
-
Jeong, D., Park, H., Park, K., Kim, J.; Iris Recognition in Mobile Phone Based on Adaptive Gabor Filter. In In: Zhang, D., Jain, A. (eds.). LNCS, vol. 3832, pp. 457-463. Springer, Heidelberg (2005)
-
(2005)
LNCS
, vol.3832
, pp. 457-463
-
-
Jeong, D.1
Park, H.2
Park, K.3
Kim, J.4
-
6
-
-
33845701766
-
Authenticating mobile phone users using keystroke analysis
-
Clarke, N., Furnell, S.; Authenticating mobile phone users using keystroke analysis. International Journal of Information Security. Vol 6 Issue 1, pp 1-14. (2007)
-
(2007)
International Journal of Information Security
, vol.6
, Issue.1
, pp. 1-14
-
-
Clarke, N.1
Furnell, S.2
-
7
-
-
77955733560
-
A real-time in-air signature biometric technique using a mobile device embedding an accelerometer. NDT (1). editor(s) filip zavoral and jakub yaghob and pit pichappan and eyas el-qawasmeh
-
Springer, Year
-
Guerra-Casanova J, Sánchez-Ávila C., de-Santos-Sierra A., Bailador, G, Jara-Vera, V.; A Real-Time In-Air Signature Biometric Technique Using a Mobile Device Embedding an Accelerometer. NDT (1). editor(s) Filip Zavoral and Jakub Yaghob and Pit Pichappan and Eyas El-Qawasmeh. Communications in Computer and Information Science, (87) 497-503, Springer, Year 2010.
-
(2010)
Communications in Computer and Information Science
, vol.87
, pp. 497-503
-
-
Guerra-Casanova, J.1
Sánchez-Ávila, C.2
De-Santos-Sierra, A.3
Bailador, G.4
Jara-Vera, V.5
-
8
-
-
0029238493
-
Improving system security via proactive password checking
-
Bishop, M. Improving system security via proactive password checking. Computers and Security 14(3). 1995
-
(1995)
Computers and Security
, vol.14
, Issue.3
-
-
Bishop, M.1
-
11
-
-
0033277446
-
Password security: An empirical study
-
March
-
Zviran, M., Haga, W.; Password security: an empirical study. J. Manage. Inf. Syst., 15(4):161-185, March 1999.
-
(1999)
J. Manage. Inf. Syst.
, vol.15
, Issue.4
, pp. 161-185
-
-
Zviran, M.1
Haga, W.2
-
12
-
-
34249733184
-
Improving password security and memorability to protect personal and organizational information
-
August
-
Vu, Kim-Phuong L., Proctor, Robert W., Bhargav-Spantzel, Abhilasha, Tai, Bik-Lam ., Cook, Joshua and Eugene Schultz, E. Improving password security and memorability to protect personal and organizational information. International Journal of Human-Computer Studies Volume 65 Issue 8, August, 2007.
-
(2007)
International Journal of Human-Computer Studies
, vol.65
, Issue.8
-
-
Vu, K.-P.L.1
Proctor, R.W.2
Bhargav-Spantzel, A.3
Tai, B.-L.4
Cook, J.5
Eugene Schultz, E.6
-
13
-
-
33746659942
-
Accelerometer-based gesture control for a design environment
-
Kela, J., Korpipää, P., Mäntyjärvi, J., Kallio, S., Savino, G., Jozzo, L., Marca, S.; Accelerometer-based gesture control for a design environment. Personal and Ubiquitous Computing. (2006)
-
(2006)
Personal and Ubiquitous Computing
-
-
Kela, J.1
Korpipää, P.2
Mäntyjärvi, J.3
Kallio, S.4
Savino, G.5
Jozzo, L.6
Marca, S.7
-
14
-
-
0003516147
-
-
Ed. Press, Cambridge U
-
Durbin, R., Eddy, S., Krogh, A., Mitchison, G.; Biological sequence analysis. Ed. Press, Cambridge U. (2006)
-
(2006)
Biological Sequence Analysis
-
-
Durbin, R.1
Eddy, S.2
Krogh, A.3
Mitchison, G.4
-
17
-
-
0033888070
-
An introduction to evaluating biometric systems
-
Phillips, P.J., Martin, A., Wilson C.L., Przybocki M.; An Introduction to Evaluating Biometric Systems. Computer 21(2). (2000)
-
(2000)
Computer
, vol.21
, pp. 2
-
-
Phillips, P.J.1
Martin, A.2
Wilson, C.L.3
Przybocki, M.4
-
18
-
-
0003922190
-
-
Wiley-Interscience, 2 edition November
-
Duda, R.O., Hart P.E., Stork, D.G.; Pattern Classification. Wiley-Interscience, 2 edition, November 2001.
-
(2001)
Pattern Classification
-
-
Duda, R.O.1
Hart, P.E.2
Stork, D.G.3
|