-
1
-
-
13244284703
-
User authentication through typing biometrics features
-
DOI 10.1109/TSP.2004.839903
-
L.C.F. Araújo, L.H.R. Sucupira, M.G. Lizárraga, L.L. Ling, and J.B.T. Yabu-Uti User authentication through typing biometrics features IEEE Transactions on Signal Processing 53 2005 851 855 (Pubitemid 40181779)
-
(2005)
IEEE Transactions on Signal Processing
, vol.53
, Issue.2
, pp. 851-855
-
-
Araujo, L.C.F.1
Sucupira Jr., L.H.R.2
Lizarraga, M.G.3
Ling, L.L.4
Yabu-Uti, J.B.T.5
-
2
-
-
45849114774
-
A convertible multi-authenticated encryption scheme for group communications
-
T.Y. Chang A convertible multi-authenticated encryption scheme for group communications Information Sciences 178 17 2008 3426 3434
-
(2008)
Information Sciences
, vol.178
, Issue.17
, pp. 3426-3434
-
-
Chang, T.Y.1
-
3
-
-
77958095782
-
A communication-efficient three-party password authenticated key exchange protocol
-
T.Y. Chang, M.S. Hwang, and W.P. Yang A communication-efficient three-party password authenticated key exchange protocol Information Sciences 181 2 2011 217 226
-
(2011)
Information Sciences
, vol.181
, Issue.2
, pp. 217-226
-
-
Chang, T.Y.1
Hwang, M.S.2
Yang, W.P.3
-
4
-
-
84862870615
-
A graphical-based password keystroke dynamic authentication system for touch screen handheld mobile devices
-
T.Y. Chang, C.J. Tsai, J.H. Lin, and A graphical-based password keystroke dynamic authentication system for touch screen handheld mobile devices Journal of Systems and Software 85 5 2012 1157 1165
-
(2012)
Journal of Systems and Software
, vol.85
, Issue.5
, pp. 1157-1165
-
-
Chang, T.Y.1
Tsai, C.J.2
Lin, J.H.3
-
5
-
-
84862861708
-
A simple keystroke dynamics-based authentication system using means and standard deviations
-
C.L. Liu, T.Y. Chang, M.L. Chiang, and C.J. Tsai A simple keystroke dynamics-based authentication system using means and standard deviations Journal of Internet Technology 13 3 2012 439 444
-
(2012)
Journal of Internet Technology
, vol.13
, Issue.3
, pp. 439-444
-
-
Liu, C.L.1
Chang, T.Y.2
Chiang, M.L.3
Tsai, C.J.4
-
7
-
-
0034140877
-
Protecting secret keys with personal entropy
-
DOI 10.1016/S0167-739X(99)00055-2
-
C. Ellison, C. Hall, R. Mibert, and B. Schneier Protecting secret keys with personal entry Future Generation Computer Systems 16 4 2000 311 318 (Pubitemid 30552901)
-
(2000)
Future Generation Computer Systems
, vol.16
, Issue.4
, pp. 311-318
-
-
Ellison, C.1
Hall, C.2
Milbert, R.3
Schneier, B.4
-
9
-
-
0034497380
-
Multi-technique approach for user identification through keystroke dynamics
-
S. Haider, A. Abbas, A.K. Zaidi, A multi-technique approach for user identification through keystroke dynamics, in: IEEE International Conference on System, Man, and Cybernetics, 2000, pp. 1336-1341. (Pubitemid 32069225)
-
(2000)
Proceedings of the IEEE International Conference on Systems, Man and Cybernetics
, vol.2
, pp. 1336-1341
-
-
Haider Sajjad1
Abbas Ahmed2
Zaidi Abbas, K.3
-
10
-
-
84862848138
-
NXP RFID encryption cracked
-
Christoph Hammerschmidt
-
Christoph Hammerschmidt, NXP RFID encryption cracked, EE Times, 2008. < http://www.eetimes.com >.
-
(2008)
EE Times
-
-
-
11
-
-
84855431560
-
Efficient certificateless proxy signature scheme with provable security
-
J. Herranz Efficient certificateless proxy signature scheme with provable security Information Sciences 188 1 2012 322 337
-
(2012)
Information Sciences
, vol.188
, Issue.1
, pp. 322-337
-
-
Herranz, J.1
-
12
-
-
37849023553
-
User classification for keystroke dynamics authentication
-
S. Hocquet, J.Y. Ramel, H. Cardot, User classification for keystroke dynamics authentication, in: Advances in Biometrics, Lecture Notes in Computer Science 4642, 2009, pp. 531-539.
-
(2009)
Advances in Biometrics, Lecture Notes in Computer Science
, vol.4642
, pp. 531-539
-
-
Hocquet, S.1
Ramel, J.Y.2
Cardot, H.3
-
14
-
-
57849163559
-
Keystroke dynamics-based authentication for mobile devices
-
S. Hwang, S. Cho, and S. Park Keystroke dynamics-based authentication for mobile devices Computers & Security 28 1-2 2009 85 93
-
(2009)
Computers & Security
, vol.28
, Issue.12
, pp. 85-93
-
-
Hwang, S.1
Cho, S.2
Park, S.3
-
15
-
-
44849117259
-
Improvement of keystroke data quality through artificial rhythms and cues
-
P. Kang, S. Park, S. Hwang, H. Lee, and S. Cho Improvement of keystroke data quality through artificial rhythms and cues Computers & Security 27 1-2 2008 3 11
-
(2008)
Computers & Security
, vol.27
, Issue.12
, pp. 3-11
-
-
Kang, P.1
Park, S.2
Hwang, S.3
Lee, H.4
Cho, S.5
-
17
-
-
0001117376
-
Spatiotemporal connectionist networks: A taxonomy and review
-
DOI 10.1162/089976601300014538
-
S.C. Kremer Spatiotemporal connectionist networks: a taxonomy and review Neural Computation 13 2001 249 306 (Pubitemid 33594999)
-
(2001)
Neural Computation
, vol.13
, Issue.2
, pp. 249-306
-
-
Kremer, S.C.1
-
18
-
-
79953274686
-
Self-generated-certificate public key encryption without pairing and its application
-
J. Lai, W. Kou, and K. Chen Self-generated-certificate public key encryption without pairing and its application Information Sciences 181 11 2011 2422 2435
-
(2011)
Information Sciences
, vol.181
, Issue.11
, pp. 2422-2435
-
-
Lai, J.1
Kou, W.2
Chen, K.3
-
19
-
-
34249913467
-
Retraining a keystroke dynamics-based authenticator with impostor patterns
-
H.J. Lee, and S. Cho Retraining a keystroke dynamics-based authenticator with impostor patterns Computers & Security 26 2006 300 310
-
(2006)
Computers & Security
, vol.26
, pp. 300-310
-
-
Lee, H.J.1
Cho, S.2
-
20
-
-
76349117227
-
Simple password-based three-party authenticated key exchange without server public keys
-
T.F. Lee, and T. Hwang Simple password-based three-party authenticated key exchange without server public keys Information Sciences 180 9 2010 1702 1714
-
(2010)
Information Sciences
, vol.180
, Issue.9
, pp. 1702-1714
-
-
Lee, T.F.1
Hwang, T.2
-
21
-
-
38049180651
-
Keystroke pressure-based typing biometrics authentication system using support vector machines
-
W. Martono, H. Ali, M.J.E. Salami, Keystroke pressure-based typing biometrics authentication system using support vector machines, in: Computational Science and Its Applications, Lecture Notes in Computer Science 4706, 2007, pp. 85-93.
-
(2007)
Computational Science and Its Applications, Lecture Notes in Computer Science
, vol.4706
, pp. 85-93
-
-
Martono, W.1
Ali, H.2
Salami, M.J.E.3
-
22
-
-
1242295745
-
Security requirements for cryptographic modules
-
National Institute of Standards and Technology, FIPS PUB 140-2 US Department of Commerce May
-
National Institute of Standards and Technology, FIPS PUB 140-2, security requirements for cryptographic modules, in: National Institute of Standards and Technology, US Department of Commerce, May 2004.
-
(2004)
National Institute of Standards and Technology
-
-
-
23
-
-
0031121887
-
Verification of computer users using keystroke dynamics
-
PII S1083441997001520
-
M.S. Obaidat, and B. Sadoun Verification of computer users using keystroke dynamics IEEE Transactions on System, Man, and Cybernetics - Part B: Cybernetics 27 1997 261 269 (Pubitemid 127770659)
-
(1997)
IEEE Transactions on Systems, Man, and Cybernetics, Part B: Cybernetics
, vol.27
, Issue.2
, pp. 261-269
-
-
Obaidat, M.S.1
Sadoun, B.2
-
24
-
-
84862858138
-
-
PC Toolsdasfasdf Security guide for windows - random password generator
-
PC Toolsdasfasdf Security guide for windows - random password generator, 2010. < http://www.pctools.com/guides/password >.
-
(2010)
-
-
-
25
-
-
0032021402
-
Computer user verification using login string keystroke dynamics
-
PII S1083442798015859
-
J.A. Robinson, V.M. Liang, J.A. Michael Chambers, and C.L. MacKenzie Computer users verification using login string keystroke dynamics IEEE Transactions on System, Man, and Cybernetics - Part A: Systems and Humans 28 1998 236 241 (Pubitemid 128752056)
-
(1998)
IEEE Transactions on Systems, Man, and Cybernetics Part A:Systems and Humans.
, vol.28
, Issue.2
, pp. 236-241
-
-
Robinson, J.A.1
Liang, V.M.2
Chambers, J.A.M.3
MacKenzie, C.L.4
-
27
-
-
24644438726
-
A parallel decision tree-based method for user authentication based on keystroke patterns
-
DOI 10.1109/TSMCB.2005.846648
-
Y. Sheng, V.V. Phoha, and S.M. Rovnyak A parallel decision tree-based method for user authentication based on keystroke patterns IEEE Transactions on System, Man, and Cybernetics - Part B: Cybernetics 35 2005 826 833 (Pubitemid 41644063)
-
(2005)
IEEE Transactions on Systems, Man, and Cybernetics, Part B: Cybernetics
, vol.35
, Issue.4
, pp. 826-833
-
-
Sheng, Y.1
Phoha, V.V.2
Rovnyak, S.M.3
-
28
-
-
80055041764
-
Provably secure three-party password-based authenticated key exchange protocol
-
J. Zhao, and D. Gu Provably secure three-party password-based authenticated key exchange protocol Information Sciences 184 1 2012 310 323
-
(2012)
Information Sciences
, vol.184
, Issue.1
, pp. 310-323
-
-
Zhao, J.1
Gu, D.2
|