-
1
-
-
84961346783
-
Smudge attacks on smartphone touch screens
-
Aviv, A. J., Gibson, K., Mossop, E., Blaze, M., Smith, J. M. Smudge attacks on smartphone touch screens. In USENIX 4th Workshop WOOT 2010.
-
USENIX 4th Workshop WOOT 2010
-
-
Aviv, A.J.1
Gibson, K.2
Mossop, E.3
Blaze, M.4
Smith, J.M.5
-
2
-
-
23944443283
-
Combining biometric evidence for per-son authentication
-
Springer
-
Bigun, J., Fierrez-Aguilar, J., Ortega-Garcia, J., Gonza-les-Rodriguez, J. Combining biometric evidence for per-son authentication. Advanced Studies in Biometrics. Springer (2005), 1-18.
-
(2005)
Advanced Studies in Biometrics
, pp. 1-18
-
-
Bigun, J.1
Fierrez-Aguilar, J.2
Ortega-Garcia, J.3
Gonza-Les-Rodriguez, J.4
-
3
-
-
0029393187
-
Person identification using multiple cues
-
Brunelli, R., Falavigna, D. Person identification using multiple cues. IEEE Transactions on Pattern Analysis and Machine Intelligence, 17(10). (1995), 955-966.
-
(1995)
IEEE Transactions on Pattern Analysis and Machine Intelligence
, vol.17
, Issue.10
, pp. 955-966
-
-
Brunelli, R.1
Falavigna, D.2
-
5
-
-
0040490584
-
Computer text-editing: An information-processing analysis of a routine cognitive skill
-
Card, S., Moran, T., Newell, A. Computer text-editing: An information-processing analysis of a routine cognitive skill. Cognitive Psychology, 12(1). (1980), 32-74.
-
(1980)
Cognitive Psychology
, vol.12
, Issue.1
, pp. 32-74
-
-
Card, S.1
Moran, T.2
Newell, A.3
-
6
-
-
78650121432
-
Authentication in the clouds: A framework and its application to mobile users
-
ACM Press
-
Chow, R., Jakobsson, M., Masuoka, R., Molina, J., Niu, Y., Shi, E., Song, Z. Authentication in the clouds: a framework and its application to mobile users. In Proceedings Workshop CCSW 2010. ACM Press (2010), 1-6.
-
(2010)
Proceedings Workshop CCSW 2010
, pp. 1-6
-
-
Chow, R.1
Jakobsson, M.2
Masuoka, R.3
Molina, J.4
Niu, Y.5
Shi, E.6
Song, Z.7
-
7
-
-
33845701766
-
Authenticating mobile phone users using keystroke analysis
-
Springer
-
Clarke, N.L., Furnell, S.M. Authenticating mobile phone users using keystroke analysis. International Journal of Information Security, 6(1). Springer (2007), 1-14.
-
(2007)
International Journal of Information Security
, vol.6
, Issue.1
, pp. 1-14
-
-
Clarke, N.L.1
Furnell, S.M.2
-
8
-
-
0036276843
-
Acceptance of subscriber authentication methods for mobile telephony devices
-
Clarke, N.L., Furnell, S.M., Rodwell, P.M., Reynolds P.L. Acceptance of subscriber authentication methods for mobile telephony devices. Computers & Security, 21 (3). (2002), 220-228.
-
(2002)
Computers & Security
, vol.21
, Issue.3
, pp. 220-228
-
-
Clarke, N.L.1
Furnell, S.M.2
Rodwell, P.M.3
Reynolds, P.L.4
-
9
-
-
0037699592
-
Usability and biometric verification at the ATM interface
-
ACM Press
-
Coventry, L., De Angeli, A., Johnson, G. Usability and biometric verification at the ATM interface. In Proceed-ings CHI 2003. ACM Press (2003), 153-160.
-
(2003)
Proceed-ings CHI 2003
, pp. 153-160
-
-
Coventry, L.1
De Angeli, A.2
Johnson, G.3
-
10
-
-
84950377558
-
Recognizing friends by their walk: Gait perception without familiarity cues
-
Cutting, J., Kozlowski, L. Recognizing friends by their walk: Gait perception without familiarity cues. Bulletin of the Psychonomic Society, 9(5). (1977), 353-356.
-
(1977)
Bulletin of the Psychonomic Society
, vol.9
, Issue.5
, pp. 353-356
-
-
Cutting, J.1
Kozlowski, L.2
-
11
-
-
70350716569
-
Look into my eyes! Can you guess my password? in
-
ACM Press
-
De Luca, A., Denzel, M. and Hussmann, H. Look into my eyes! Can you guess my password? In Proceedings SOUPS 2009. ACM Press (2009), 7:1-7:12.
-
(2009)
Proceedings SOUPS 2009
, pp. 71-712
-
-
De Luca, A.1
Denzel, M.2
Hussmann, H.3
-
12
-
-
69249127514
-
Do background images improve "draw a secret" graphical passwords?
-
ACM Press
-
Dunphy, P., Yan, J. Do background images improve "draw a secret" graphical passwords? In Proceedings CCS 2007. ACM Press (2007), 36-47.
-
(2007)
Proceedings CCS 2007
, pp. 36-47
-
-
Dunphy, P.1
Yan, J.2
-
13
-
-
0006422102
-
Factors in the retention and re-learning of perceptual-motor skill
-
Fleishman, E., Parker, J. Factors in the retention and re-learning of perceptual-motor skill. Journal of Experi-mental Psychology, 64. (1962), 215-226.
-
(1962)
Journal of Experi-mental Psychology
, vol.64
, pp. 215-226
-
-
Fleishman, E.1
Parker, J.2
-
14
-
-
78650918707
-
A location based security framework for authenticating mo-bile phones
-
ACM Press
-
Francis, L., Mayes, K., Hancke, G., Markantonakis, K. A location based security framework for authenticating mo-bile phones. In Proceedings Workshop M-MPAC 2010. ACM Press (2010), 5:1-5:8.
-
(2010)
Proceedings Workshop M-MPAC 2010
, pp. 51-58
-
-
Francis, L.1
Mayes, K.2
Hancke, G.3
Markantonakis, K.4
-
15
-
-
70349448250
-
Computing and visualizing dynamic time warping alignments
-
R: the DTW package
-
Giorgino, T. Computing and visualizing dynamic time warping alignments in R: the DTW package. Journal of Statistical Software, 31(7). (2009), 1-24.
-
(2009)
Journal of Statistical Software
, vol.31
, Issue.7
, pp. 1-24
-
-
Giorgino, T.1
-
16
-
-
51449118740
-
Biometric gait au-thentication using accelerometer sensor
-
Academy Publisher
-
Gafurov, D., Helkala, K., Søndrol, T. Biometric gait au-thentication using accelerometer sensor. Journal of Com-puters, 1 (7). Academy Publisher (2006), 51-59.
-
(2006)
Journal of Com-puters
, vol.1
, Issue.7
, pp. 51-59
-
-
Gafurov, D.1
Helkala, K.2
Søndrol, T.3
-
17
-
-
84874561028
-
Implicit authentication for mobile devices
-
USENIX Association
-
Jakobsson, M., Shi, E., Golle, P., Chow, R. Implicit authentication for mobile devices. In Proceedings HotSec 2009. USENIX Association, 9-9.
-
Proceedings HotSec 2009
, pp. 9-9
-
-
Jakobsson, M.1
Shi, E.2
Golle, P.3
Chow, R.4
-
18
-
-
84862061992
-
The design and analysis of graphical passwords
-
USENIX Association
-
Jermyn, I., Mayer, A., Monrose, F., Reiter, M. K., Rubin, A. D. The design and analysis of graphical passwords. In Proceedings SSYM 1999. USENIX Association.
-
Proceedings SSYM 1999
-
-
Jermyn, I.1
Mayer, A.2
Monrose, F.3
Reiter, M.K.4
Rubin, A.D.5
-
19
-
-
51349155909
-
DTW based verification scheme of biometric signatures
-
Kar, B., Dutta, P. K., Basu, T. K., Vielhauer, C., Dittmann, J. DTW based verification scheme of biometric signatures. In Proceedings ICIT 2006.
-
Proceedings ICIT 2006
-
-
Kar, B.1
Dutta, P.K.2
Basu, T.K.3
Vielhauer, C.4
Dittmann, J.5
-
20
-
-
84887058303
-
Can i borrow your phone? Understanding concerns when sharing mobile phones
-
ACM Press
-
Karlson, A., Brush, A.J., Schechter, S. Can i borrow your phone? Understanding concerns when sharing mobile phones. In Proceedings CHI 2009. ACM Press (2009), 1647-1650.
-
(2009)
Proceedings CHI 2009
, pp. 1647-1650
-
-
Karlson, A.1
Brush, A.J.2
Schechter, S.3
-
21
-
-
77954017165
-
Multi-touch authentication on tabletops
-
ACM Press
-
Kim, D., Dunphy, P., Briggs, P., Hook, J., Nicholson, J., Nicholson, J., Olivier, P. Multi-touch authentication on tabletops. In Proceedings CHI 2010. ACM Press (2010), 1093-1102.
-
(2010)
Proceedings CHI 2010
, pp. 1093-1102
-
-
Kim, D.1
Dunphy, P.2
Briggs, P.3
Hook, J.4
Nicholson, J.5
Nicholson, J.6
Olivier, P.7
-
22
-
-
0041108231
-
Dynamic identity verification via keystroke characteristics
-
Academic Press Ltd
-
Legget, J., Williams, G., Usnick, M. Dynamic identity verification via keystroke characteristics. International Journal of Man-Machine Studies, 35 (6). Academic Press Ltd (1991), 859-870.
-
(1991)
International Journal of Man-Machine Studies
, vol.35
, Issue.6
, pp. 859-870
-
-
Legget, J.1
Williams, G.2
Usnick, M.3
-
23
-
-
33646811518
-
Identifying users of portable devices from gait pattern with accelerometers
-
Mantyjarvi, J., Lindholm, M., Vildjiounaite, E., Makela, S. M., Ailisto, H.A. Identifying users of portable devices from gait pattern with accelerometers. In Proceedings ICASSP 2005.
-
Proceedings ICASSP 2005
-
-
Mantyjarvi, J.1
Lindholm, M.2
Vildjiounaite, E.3
Makela, S.M.4
Ailisto, H.A.5
-
24
-
-
80155203922
-
MOBIO: Mobile biometric face and speaker authentication
-
Marcel, S., Cool, C., Atanasoaei, C., Tarsetti, F., Pesán, J., Matejka, P., Cernocky, J., Helistekangas, M., Turtinen, M. MOBIO: mobile biometric face and speaker authentication, In Proceedings CVPR 2010.
-
Proceedings CVPR 2010
-
-
Marcel, S.1
Cool, C.2
Atanasoaei, C.3
Tarsetti, F.4
Pesán, J.5
Matejka, P.6
Cernocky, J.7
Helistekangas, M.8
Turtinen, M.9
-
25
-
-
0016997596
-
Pictorial supe-riority effect
-
Nelson, D. L., Reed, V. S., Walling, J. R. Pictorial supe-riority effect. Journal of Experimental Psychology: Hu-man Learning and Memory 2 (5). (1976), 523-528.
-
(1976)
Journal of Experimental Psychology: Hu-man Learning and Memory
, vol.2
, Issue.5
, pp. 523-528
-
-
Nelson, D.L.1
Reed, V.S.2
Walling, J.R.3
-
26
-
-
51049103392
-
Understanding user perspectives on biometric technology
-
ACM Press
-
Pons, A.P., Polak, P. Understanding user perspectives on biometric technology. Commun. ACM, 51 (9). ACM Press (2008), 115-118.
-
(2008)
Commun. ACM
, vol.51
, Issue.9
, pp. 115-118
-
-
Pons, A.P.1
Polak, P.2
-
28
-
-
47749126623
-
Cell phones personal authentication systems using multimodal biometrics
-
Springer
-
Rokita, J. Krzyzak, A., Suen, C.Y. Cell phones personal authentication systems using multimodal biometrics. In Proceedings ICIAR 2008. Springer (2008), 1013-1022.
-
(2008)
Proceedings ICIAR 2008
, pp. 1013-1022
-
-
Rokita Krzyzak J, A.1
Suen, C.Y.2
-
29
-
-
0017930815
-
Dynamic programming algorithm optimization for spoken word recognition
-
Sakoe, H., Chiba, S. Dynamic programming algorithm optimization for spoken word recognition. IEEE Transac-tions on Acoustics, Speech and Signal Processing, 26(1). (1978), 43-49.
-
(1978)
IEEE Transac-tions on Acoustics, Speech and Signal Processing
, vol.26
, Issue.1
, pp. 43-49
-
-
Sakoe, H.1
Chiba, S.2
-
30
-
-
0031022919
-
Functional stages in the formation of human long-term motor memory
-
Shadmer, R., Brashers-Krug, T. Functional stages in the formation of human long-term motor memory. The Journal of Neuroscience, 17(1). (1997), 409-419.
-
(1997)
The Journal of Neuroscience
, vol.17
, Issue.1
, pp. 409-419
-
-
Shadmer, R.1
Brashers-Krug, T.2
-
31
-
-
85037074313
-
Implicit au-thentication through learning user behavior
-
Springer
-
Shi, E., Niu, Y., Jakobsson, M., Chow, R. Implicit au-thentication through learning user behavior. In Proceed-ings ISC 2010. Springer (2011), 99-113.
-
(2011)
Proceed-ings ISC 2010
, pp. 99-113
-
-
Shi, E.1
Niu, Y.2
Jakobsson, M.3
Chow, R.4
-
32
-
-
78650226128
-
Survey of bio-metric recognition systems and their applications
-
Sonkamble, S., Thool, R., Sonkamble, B. Survey of bio-metric recognition systems and their applications. Journal of Theoretical and Applied Information Technology, 11(1). (2010), 45-51.
-
(2010)
Journal of Theoretical and Applied Information Technology
, vol.11
, Issue.1
, pp. 45-51
-
-
Sonkamble, S.1
Thool, R.2
Sonkamble, B.3
-
34
-
-
74049105488
-
EPet: When cellular phone learns to recognize its owner
-
ACM Press
-
Tamviruzzaman, M., Ahamed, S. I., Hasan, C. S., O'brien, C. ePet: When cellular phone learns to recognize its owner. In Proceedings Workshop SafeConfig 2009. ACM Press (2009), 13-18.
-
(2009)
Proceedings Workshop SafeConfig 2009
, pp. 13-18
-
-
Tamviruzzaman, M.1
Ahamed, S.I.2
Hasan, C.S.3
O'Brien, C.4
-
35
-
-
84961930273
-
The use of passwords for controlled access to remote computer systems and services
-
ACM Press
-
Wood, H.M. The use of passwords for controlled access to remote computer systems and services. In Proceedings AFIPS 1977. ACM Press(1977), 27-33.
-
(1977)
Proceedings AFIPS 1977
, pp. 27-33
-
-
Wood, H.M.1
-
36
-
-
70049098777
-
PassShapes: Utilizing stroke based authentication to increase password memorability
-
ACM Press
-
Weiss, R., De Luca, A. PassShapes: utilizing stroke based authentication to increase password memorability. In Proceedings NordiCHI 2008. ACM Press (2008), 383-392.
-
(2008)
Proceedings NordiCHI 2008
, pp. 383-392
-
-
Weiss, R.1
De Luca, A.2
-
37
-
-
70350654051
-
Implicit user re-authentication for mobile devices
-
Springer
-
Yazji, S., Chen, X. Dick, R.P., Scheuermann P. Implicit user re-authentication for mobile devices. In Proceedings UIC 2009. Springer (2009), 325-339.
-
(2009)
Proceedings UIC 2009
, pp. 325-339
-
-
Yazji, S.1
Chen Dick X, R.P.2
Scheuermann, P.3
-
38
-
-
84863085276
-
Sensitivity specificity, ac-curacy, associated confidence interval and ROC analysis with practical SAS® implementations
-
Zhu, W., Zeng, N., Wang, N. Sensitivity, specificity, ac-curacy, associated confidence interval and ROC analysis with practical SAS® implementations. In Proceedings Nesug 2010.
-
Proceedings Nesug 2010
-
-
Zhu, W.1
Zeng, N.2
Wang, N.3
|