-
1
-
-
34548090575
-
User authentication through typing biometrics features
-
Proc. 1st Int'l Conf. on Biometric Authentication (ICBA)
-
L. C. F. Araújo, L. H. R. Sucupira, M. G. Lizárraga, L. L. Ling, and J. B. T. Yabu-uti. "User authentication through typing biometrics features", In Proc. 1st Int'l Conf. on Biometric Authentication (ICBA), volume 3071 of Lecture Notes in Computer Science, pp. 694-700, 2004.
-
(2004)
Lecture Notes in Computer Science
, vol.3071
, pp. 694-700
-
-
Araújo, L.C.F.1
Sucupira, L.H.R.2
Lizárraga, M.G.3
Ling, L.L.4
Yabu-uti, J.B.T.5
-
2
-
-
78650165017
-
User Authentication through Keystroke Dynamics
-
F. Bergadano, D. Gunetti, and C. Picardi, "User Authentication through Keystroke Dynamics", ACM Trans. Information and System Security, 5(4), pp. 367-397, 2002.
-
(2002)
ACM Trans. Information and System Security
, vol.5
, Issue.4
, pp. 367-397
-
-
Bergadano, F.1
Gunetti, D.2
Picardi, C.3
-
3
-
-
0025541584
-
Computer-Access Security Systems using Keystroke Dynamics
-
S. Bleha, C. Slivinsky, and B. Hussein, "Computer-Access Security Systems using Keystroke Dynamics", IEEE Trans. Pattern Analysis and Machine Intelligence, vol. 12, no. 12, 1990, pp. 1217-1222.
-
(1990)
IEEE Trans. Pattern Analysis and Machine Intelligence
, vol.12
, Issue.12
, pp. 1217-1222
-
-
Bleha, S.1
Slivinsky, C.2
Hussein, B.3
-
4
-
-
0005327658
-
Web-based keystroke dynamics identity verification using neural network
-
S. Cho, C. Han, D. H. Han, and H. Kim. "Web-based keystroke dynamics identity verification using neural network", Journal of Organizational Computing and Electronic Commerce, 10(4):295-307, 2000.
-
(2000)
Journal of Organizational Computing and Electronic Commerce
, vol.10
, Issue.4
, pp. 295-307
-
-
Cho, S.1
Han, C.2
Han, D.H.3
Kim, H.4
-
5
-
-
0004260230
-
-
American Book Company, New York, USA
-
A. Dvorak, N. Merrick, W. Dealey, and G. Ford. "Typewriting Behavior. American Book Company, New York, USA, 1936.
-
(1936)
Typewriting Behavior
-
-
Dvorak, A.1
Merrick, N.2
Dealey, W.3
Ford, G.4
-
7
-
-
0041108232
-
-
Technical Report RADC-TR-77-333, Rome Air Development Center, October
-
G. Forsen, M. Nelson, and R. Staron, Jr. "Personal attributes authentication techniques", Technical Report RADC-TR-77-333, Rome Air Development Center, October 1977.
-
(1977)
Personal Attributes Authentication Techniques
-
-
Forsen, G.1
Nelson, M.2
Staron Jr., R.3
-
8
-
-
0343700185
-
-
Rand Rep. R-2560-NSF, Rand Corporation
-
R. Gaines, W. Lisowski, S. Press, and N. Shapiro, "Authentication by keystroke timing: some preliminary results", Rand Rep. R-2560-NSF, Rand Corporation, 1980.
-
(1980)
Authentication by Keystroke Timing: Some Preliminary Results
-
-
Gaines, R.1
Lisowski, W.2
Press, S.3
Shapiro, N.4
-
9
-
-
78149479952
-
Low Cost and Usable Multimodal Biometric System Based on Keystroke Dynamics and 2D Face Recognition
-
R. Giot, B. Hemery and C. Rosenberger, "Low Cost and Usable Multimodal Biometric System Based on Keystroke Dynamics and 2D Face Recognition", Int'l Conf. on Pattern Recognition (ICPR), pp. 1128 -1131, 2010.
-
(2010)
Int'l Conf. on Pattern Recognition (ICPR)
, pp. 1128-1131
-
-
Giot, R.1
Hemery, B.2
Rosenberger, C.3
-
11
-
-
0034497380
-
A multi-technique approach for user identification through keystroke dynamics
-
S. Haider, A. Abbas, and A. K. Zaidi. "A multi-technique approach for user identification through keystroke dynamics", IEEE Int'l Conf. on Systems, Man and Cybernetics, pp. 1336-1341, 2000.
-
(2000)
IEEE Int'l Conf. on Systems, Man and Cybernetics
, pp. 1336-1341
-
-
Haider, S.1
Abbas, A.2
Zaidi, A.K.3
-
14
-
-
10044236375
-
Biometrics: A grand challenge
-
August
-
A. K. Jain, S. Pankanti, S. Prabhakar, L. Hong, and A. Ross, "Biometrics: a grand challenge", Proc. Int'l Conf. on Pattern Recognition, vol. 2, pp. 935-942, August 2004.
-
(2004)
Proc. Int'l Conf. on Pattern Recognition
, vol.2
, pp. 935-942
-
-
Jain, A.K.1
Pankanti, S.2
Prabhakar, S.3
Hong, L.4
Ross, A.5
-
15
-
-
0742290133
-
An introduction to biometric recognition
-
Jan
-
A. K. Jain, A. Ross, and S. Prabhakar, "An introduction to biometric recognition", IEEE Trans. on Circuits and Systems for Video Technology, vol. 14, pp. 4-20, Jan 2004.
-
(2004)
IEEE Trans. on Circuits and Systems for Video Technology
, vol.14
, pp. 4-20
-
-
Jain, A.K.1
Ross, A.2
Prabhakar, S.3
-
16
-
-
0025384135
-
Identity authentication based on keystroke latencies
-
R. Joyce and G. Gupta. "Identity authentication based on keystroke latencies", Communications of the ACM, 33(2):168-176, 1990.
-
(1990)
Communications of the ACM
, vol.33
, Issue.2
, pp. 168-176
-
-
Joyce, R.1
Gupta, G.2
-
18
-
-
0023843707
-
Verifying Identity via Keystroke Characteristics
-
J. Leggett and G. Williams, "Verifying Identity via Keystroke Characteristics", Int'l J. Man-Machine Studies, vol. 28, no. 1, pp. 67-76, 1988.
-
(1988)
Int'l J. Man-Machine Studies
, vol.28
, Issue.1
, pp. 67-76
-
-
Leggett, J.1
Williams, G.2
-
19
-
-
84862927413
-
Study on the Beihang Keystroke Dynamics Database
-
Y. Li, B. Zhang, Y. Cao, S. Zhao, Y. Gao and J. Liu, "Study on the Beihang Keystroke Dynamics Database", Int'l Joint Conf. on Biometrics (IJCB), pp. 1-5, 2011.
-
(2011)
Int'l Joint Conf. on Biometrics (IJCB)
, pp. 1-5
-
-
Li, Y.1
Zhang, B.2
Cao, Y.3
Zhao, S.4
Gao, Y.5
Liu, J.6
-
21
-
-
1342275940
-
-
Springer, NY
-
D. Maltoni, D. Maio, A. K. Jain, and S. Prabhakar, Handbook of Fingerprint Recognition, Springer, NY, 2003.
-
(2003)
Handbook of Fingerprint Recognition
-
-
Maltoni, D.1
Maio, D.2
Jain, A.K.3
Prabhakar, S.4
-
22
-
-
84856098360
-
Continuous and non-intrusive identity verification in realtime environments based on free-text keystroke dynamics
-
A. Messerman, T. Mustafic, S. Camtepe and S. Albayrak, "Continuous and non-intrusive identity verification in realtime environments based on free-text keystroke dynamics", Int'l Joint Conf. on Biometrics (IJCB), 2011.
-
Int'l Joint Conf. on Biometrics (IJCB), 2011
-
-
Messerman, A.1
Mustafic, T.2
Camtepe, S.3
Albayrak, S.4
-
23
-
-
0034140431
-
Keystroke Dynamics as a Biometric for Authentication
-
F. Monrose and A.D. Rubin, "Keystroke Dynamics as a Biometric for Authentication", Future Generation Computing Systems, vol. 16, no. 4, pp. 351-359, 2000.
-
(2000)
Future Generation Computing Systems
, vol.16
, Issue.4
, pp. 351-359
-
-
Monrose, F.1
Rubin, A.D.2
-
24
-
-
12844274372
-
Typing patterns: A key to user identification
-
A. Peacock, X. Ke, and M. Wilkerson. "Typing patterns: A key to user identification", IEEE Security and Privacy, 2(5):40-47, 2004.
-
(2004)
IEEE Security and Privacy
, vol.2
, Issue.5
, pp. 40-47
-
-
Peacock, A.1
Ke, X.2
Wilkerson, M.3
-
25
-
-
0742302036
-
Biometric Recognition: Security and Privacy Concerns
-
S. Prabhakar, S. Pankanti, and A. K. Jain, "Biometric Recognition: Security and Privacy Concerns", IEEE Security and Privacy Magazine, Vol. 1, No. 2, pp. 33-42, 2003.
-
(2003)
IEEE Security and Privacy Magazine
, vol.1
, Issue.2
, pp. 33-42
-
-
Prabhakar, S.1
Pankanti, S.2
Jain, A.K.3
-
26
-
-
0032021402
-
Computer User Verification Using Login String Keystroke Dynamics
-
Mar.
-
J.A. Robinson et al., "Computer User Verification Using Login String Keystroke Dynamics", IEEE Trans. Systems, Man and Cybernetics, Part A, vol. 28, pp. 236-241, Mar. 1998.
-
(1998)
IEEE Trans. Systems, Man and Cybernetics, Part A
, vol.28
, pp. 236-241
-
-
Robinson, J.A.1
-
27
-
-
84864984428
-
Are digraphs good for free-text keystroke dynamics?
-
T. Sim and R. Janakiraman, "Are digraphs good for free-text keystroke dynamics? ", IEEE CVPR, pp. 17-22, 2007.
-
(2007)
IEEE CVPR
, pp. 17-22
-
-
Sim, T.1
Janakiraman, R.2
-
28
-
-
78149337951
-
Continuous Biometric Authentication: Can It Be More Practical?
-
E. Al Solami, C. Boyd, A. Clark, and A. K. Islam, "Continuous Biometric Authentication: Can It Be More Practical?", IEEE Int'l Conf. on High Performance Computing and Communications (HPCC), pp. 647-652, 2010.
-
(2010)
IEEE Int'l Conf. on High Performance Computing and Communications (HPCC)
, pp. 647-652
-
-
Al Solami, E.1
Boyd, C.2
Clark, A.3
Islam, A.K.4
-
29
-
-
12844256823
-
Keyboard Apparatus for Personal Identification
-
R. Spillane, "Keyboard Apparatus for Personal Identification", IBM Technical Disclosure Bulletin, vol. 17, no. 3346, 1975.
-
(1975)
IBM Technical Disclosure Bulletin
, vol.17
, Issue.3346
-
-
Spillane, R.1
-
30
-
-
0022129862
-
Identity Verification through Keyboard Characteristics
-
D. Umphress and G. Williams, "Identity Verification through Keyboard Characteristics", Int'l J. Man-Machine Studies, Vol. 23, No. 3, pp. 263-273, 1985.
-
(1985)
Int'l J. Man-Machine Studies
, vol.23
, Issue.3
, pp. 263-273
-
-
Umphress, D.1
Williams, G.2
-
31
-
-
10044222391
-
Biometric Cryptosystems: Issues and Challenges
-
June
-
U. Uludag, S. Pankanti, S. Prabhakar, and A. K.Jain, "Biometric Cryptosystems: Issues and Challenges", Proceedings of the IEEE, Special Issue on Enabling Security Technologies for Digital Rights Management, Vol. 92, No. 6, June 2004.
-
(2004)
Proceedings of the IEEE, Special Issue on Enabling Security Technologies for Digital Rights Management
, vol.92
, Issue.6
-
-
Uludag, U.1
Pankanti, S.2
Prabhakar, S.3
Jain, A.K.4
-
32
-
-
84864996881
-
Performance comparison of distance metrics in content-based image retrieval applications
-
A. Vadivel, A.K. Majumdar, and S. Sural, "Performance comparison of distance metrics in content-based image retrieval applications", Proc. of Int'l. Conf. on Information Technology, Bhubaneswar, India, pp. 159-164, 2003.
-
(2003)
Proc. of Int'l. Conf. on Information Technology, Bhubaneswar, India
, pp. 159-164
-
-
Vadivel, A.1
Majumdar, A.K.2
Sural, S.3
-
33
-
-
3943095292
-
-
McGraw-Hill, New York, USA
-
J. D. Woodward, N. M. Orlans, and P. T. Higgins. "Biometrics: Identity Assurance in the Information Age", McGraw-Hill, New York, USA, 2003.
-
(2003)
Biometrics: Identity Assurance in the Information Age
-
-
Woodward, J.D.1
Orlans, N.M.2
Higgins, P.T.3
-
34
-
-
73849087674
-
The Biometric Menagerie
-
R. Germain, A N. Yager and T. Dunstone. "The Biometric Menagerie", IEEE PAMI, Vol. 32, No. 2, 2010.
-
(2010)
IEEE PAMI
, vol.32
, Issue.2
-
-
Germain, R.1
Yager, A.N.2
Dunstone, T.3
-
35
-
-
70350234989
-
Behavioral Biometrics: A Survey and Classification
-
R. V. Yampolskiy, V. Govindaraju, "Behavioral Biometrics: A Survey and Classification", Int'l J. Biometrics, Vol. 1, No. 1, 2008.
-
(2008)
Int'l J. Biometrics
, vol.1
, Issue.1
-
-
Yampolskiy, R.V.1
Govindaraju, V.2
-
36
-
-
0141522840
-
GA-SVM wrapper approach for feature subset selection in keystroke dynamics identity verification
-
E. Yu and S. Cho. "GA-SVM wrapper approach for feature subset selection in keystroke dynamics identity verification", In Proc. Int'l Joint Conf. on Neural Networks (IJCNN), pp. 2253-2257, 2003.
-
(2003)
Proc. Int'l Joint Conf. on Neural Networks (IJCNN)
, pp. 2253-2257
-
-
Yu, E.1
Cho, S.2
-
37
-
-
78650394514
-
Performance of a long-text-input keystroke biometric authentication system using an improved k-nearest-neighbor classification method
-
R. Zack, C. Tappert, and S. Cha, "Performance of a long-text-input keystroke biometric authentication system using an improved k-nearest-neighbor classification method", IEEE Int'l Conf. on Biometrics: Theory Applications and Systems (BTAS), pp. 1-6, 2010.
-
(2010)
IEEE Int'l Conf. on Biometrics: Theory Applications and Systems (BTAS)
, pp. 1-6
-
-
Zack, R.1
Tappert, C.2
Cha, S.3
-
38
-
-
79951761885
-
Typing Biometrics: Impact of Human Learning on Performance Quality
-
Benjamin Ngugi, Beverly K. Kahn, and Marilyn Tremaine, "Typing Biometrics: Impact of Human Learning on Performance Quality", J. Data and Information Quality, Vol. 2, No. 2, p. 11, 2011.
-
(2011)
J. Data and Information Quality
, vol.2
, Issue.2
, pp. 11
-
-
Ngugi, B.1
Kahn, B.K.2
Tremaine, M.3
|