-
3
-
-
84866632744
-
Vulnerabilities in biometric encryption systems
-
A. Adler. Vulnerabilities in biometric encryption systems. In Proc. of AVBPA, 2005.
-
(2005)
Proc. of AVBPA
-
-
Adler, A.1
-
8
-
-
79958810163
-
Analysis of pattern recognition techniques for in-air signature biometrics
-
G. Bailador, C. Sanchez-Avila, J. Guerra-Casanova, and A. de Santos Sierra. Analysis of pattern recognition techniques for in-air signature biometrics. Pattern Recognition, 44(10-11):2468 - 2478, 2011.
-
(2011)
Pattern Recognition
, vol.44
, Issue.10-11
, pp. 2468-2478
-
-
Bailador, G.1
Sanchez-Avila, C.2
Guerra-Casanova, J.3
De Santos Sierra, A.4
-
11
-
-
80054841454
-
On the need for different security methods on mobile phones
-
Aug.
-
N. Ben-Asher, N. Kirschnick, H. Sieger, J. Meyer, A. Ben-Oved, and S. Möller. On the need for different security methods on mobile phones. In Proc. of MobileHCI, Aug. 2011.
-
(2011)
Proc. of MobileHCI
-
-
Ben-Asher, N.1
Kirschnick, N.2
Sieger, H.3
Meyer, J.4
Ben-Oved, A.5
Möller, S.6
-
12
-
-
84860735534
-
Mobile token-based authentication on a budget
-
Feb.
-
H. Bojinov and D. Boneh. Mobile token-based authentication on a budget. In Proc. of HotMobile, Feb. 2011.
-
(2011)
Proc. of HotMobile
-
-
Bojinov, H.1
Boneh, D.2
-
14
-
-
0035750860
-
Diamondtouch: A multi-user touch technology
-
Nov.
-
P. Dietz and D. Leigh. Diamondtouch: a multi-user touch technology. In Proc. of UIST, Nov. 2001.
-
(2001)
Proc. of UIST
-
-
Dietz, P.1
Leigh, D.2
-
15
-
-
84866624863
-
-
Digital Modulation Schemes. http://robotics.eecs.berkeley.edu/sastry/ ee20/modulation/node5.html.
-
Digital Modulation Schemes
-
-
-
16
-
-
81055156896
-
A closer look at recognition-based graphical passwords on mobile devices
-
July
-
P. Dunphy, A. P. Heiner, and N. Asokan. A closer look at recognition-based graphical passwords on mobile devices. In Proc. of SOUPS, July 2010.
-
(2010)
Proc. of SOUPS
-
-
Dunphy, P.1
Heiner, A.P.2
Asokan, N.3
-
17
-
-
3142739783
-
On the vulnerability of biometric security systems
-
IEEE, June
-
M. Faundez-Zanuy. On the vulnerability of biometric security systems. Aerospace and Electronic Systems Magazine, IEEE, 19(6):3 - 8, June 2004.
-
(2004)
Aerospace and Electronic Systems Magazine
, vol.19
, Issue.6
, pp. 3-8
-
-
Faundez-Zanuy, M.1
-
18
-
-
84866606558
-
Apple facing class-action lawsuit over kids' in-app purchases
-
Apr.
-
C. Foresman. Apple facing class-action lawsuit over kids' in-app purchases. Ars Technica, Apr. 2011.
-
(2011)
Ars Technica
-
-
Foresman, C.1
-
20
-
-
37849011664
-
On the vulnerability of fingerprint verification systems to fake fingerprints attacks
-
Oct.
-
J. Galbally-Herrero, J. Fierrez-Aguilar, J. D. Rodriguez-Gonzalez, F. Alonso-Fernandez, J. Ortega-Garcia, and M. Tapiador. On the vulnerability of fingerprint verification systems to fake fingerprints attacks. In Proc. of Carnahan Conferences on Security Technology, Oct. 2006.
-
(2006)
Proc. of Carnahan Conferences on Security Technology
-
-
Galbally-Herrero, J.1
Fierrez-Aguilar, J.2
Rodriguez-Gonzalez, J.D.3
Alonso-Fernandez, F.4
Ortega-Garcia, J.5
Tapiador, M.6
-
23
-
-
34249711260
-
Examining the content and privacy of web browsing incidental information
-
May
-
K. Hawkey and K. M. Inkpen. Examining the content and privacy of web browsing incidental information. In Proc. of WWW, May 2006.
-
(2006)
Proc. of WWW
-
-
Hawkey, K.1
Inkpen, K.M.2
-
24
-
-
43949116287
-
Biometric template security
-
17, Jan. 2008
-
A. K. Jain, K. Nandakumar, and A. Nagar. Biometric template security. EURASIP J. Adv. Signal Process, 2008:113:1-113:17, Jan. 2008.
-
(2008)
EURASIP J. Adv. Signal Process
, vol.113
, pp. 1-113
-
-
Jain, A.K.1
Nandakumar, K.2
Nagar, A.3
-
25
-
-
84860630609
-
Touch displays: A programmed man-machine interface
-
E. A. Johnson. Touch Displays: A Programmed Man-Machine Interface. Ergonomics, 10(2):271-277, 1967.
-
(1967)
Ergonomics
, vol.10
, Issue.2
, pp. 271-277
-
-
Johnson, E.A.1
-
26
-
-
77954011711
-
Can i borrow your phone?: Understanding concerns when sharing mobile phones
-
Apr
-
A. K. Karlson, A. B. Brush, and S. Schechter. Can i borrow your phone?: understanding concerns when sharing mobile phones. In Proc. of CHI, Apr. 2009.
-
(2009)
Proc. of CHI
-
-
Karlson, A.K.1
Brush, A.B.2
Schechter, S.3
-
28
-
-
70450230583
-
User evaluation of lightweight user authentication with a single tri-axis accelerometer
-
Sept.
-
J. Liu, L. Zhong, J. Wickramasuriya, and V. Vasudevan. User evaluation of lightweight user authentication with a single tri-axis accelerometer. In Proc. of MobileHCI, Sept. 2009.
-
(2009)
Proc. of MobileHCI
-
-
Liu, J.1
Zhong, L.2
Wickramasuriya, J.3
Vasudevan, V.4
-
29
-
-
84891349680
-
Proximate: Proximity-based secure pairing using ambient wireless signals
-
June
-
S. Mathur, R. Miller, A. Varshavsky, W. Trappe, and N. Mandayam. Proximate: proximity-based secure pairing using ambient wireless signals. In Proc. of MobiSys, June 2011.
-
(2011)
Proc. of MobiSys
-
-
Mathur, S.1
Miller, R.2
Varshavsky, A.3
Trappe, W.4
Mandayam, N.5
-
31
-
-
65349086799
-
Shake well before use: Intuitive and secure pairing of mobile devices
-
Jun.
-
R. Mayrhofer and H. Gellersen. Shake well before use: Intuitive and secure pairing of mobile devices. IEEE TMC, 8(6):792 -806, Jun. 2009.
-
(2009)
IEEE TMC
, vol.8
, Issue.6
, pp. 792-806
-
-
Mayrhofer, R.1
Gellersen, H.2
-
32
-
-
84866760170
-
Access control for home data sharing: Attitudes, needs and practices
-
May
-
M. L. Mazurek, J. P. Arsenault, J. Bresee, N. Gupta, I. Ion, C. Johns, D. Lee, Y. Liang, J. Olsen, B. Salmon, R. Shay, K. Vaniea, L. Bauer, L. F. Cranor, G. R. Ganger, and M. K. Reiter. Access control for home data sharing: Attitudes, needs and practices. In Proc. of CHI, May 2010.
-
(2010)
Proc. of CHI
-
-
Mazurek, M.L.1
Arsenault, J.P.2
Bresee, J.3
Gupta, N.4
Ion, I.5
Johns, C.6
Lee, D.7
Liang, Y.8
Olsen, J.9
Salmon, B.10
Shay, R.11
Vaniea, K.12
Bauer, L.13
Cranor, L.F.14
Ganger, G.R.15
Reiter, M.K.16
-
36
-
-
85008580440
-
Mobile device security using transient authentication
-
November
-
A. Nicholson, M. D. Corner, and B. D. Noble. Mobile Device Security using Transient Authentication. IEEE TMC, 5(11):1489-1502, November 2006.
-
(2006)
IEEE TMC
, vol.5
, Issue.11
, pp. 1489-1502
-
-
Nicholson, A.1
Corner, M.D.2
Noble, B.D.3
-
37
-
-
84866615915
-
-
Ringbow. http://ringbow.com/ringbow/.
-
Ringbow
-
-
-
38
-
-
78649627495
-
The IR ring: Authenticating users' touches on a multi-touch display
-
Oct.
-
V. Roth, P. Schmidt, and B. Güldenring. The IR ring: authenticating users' touches on a multi-touch display. In Proc. of UIST, Oct. 2010.
-
(2010)
Proc. of UIST
-
-
Roth, V.1
Schmidt, P.2
Güldenring, B.3
-
39
-
-
84862069121
-
Touche: Enhancing touch interaction on humans, screens, liquids, and everyday objects
-
New York, NY, USA
-
M. Sato, I. Poupyrev, and C. Harrison. Touche: enhancing touch interaction on humans, screens, liquids, and everyday objects. In Proc. of CHI, pages 483-492, New York, NY, USA, 2012.
-
(2012)
Proc. of CHI
, pp. 483-492
-
-
Sato, M.1
Poupyrev, I.2
Harrison, C.3
-
40
-
-
77953838402
-
Cracking the bluetooth pin
-
Y. Shaked and A. Wool. Cracking the bluetooth pin. In Proc. of MobiSys, pages 39-50, 2005.
-
(2005)
Proc. of MobiSys
, pp. 39-50
-
-
Shaked, Y.1
Wool, A.2
-
41
-
-
84864335381
-
Can a smartphone make your car smarter?
-
E. Sofge. Can a smartphone make your car smarter? MSN Autos, 2010.
-
(2010)
MSN Autos
-
-
Sofge, E.1
-
43
-
-
0001831930
-
The resurrecting duckling: Security issues for ad-hoc wireless networks
-
Apr.
-
F. Stajano and R. J. Anderson. The resurrecting duckling: Security issues for ad-hoc wireless networks. In Proc. of Security Protocols, Apr. 2000.
-
(2000)
Proc. of Security Protocols
-
-
Stajano, F.1
Anderson, R.J.2
-
45
-
-
33645449037
-
Body check: Biometric access protection devices and their programs put to the test
-
Nov.
-
L. Thalheim and J. Krissler. Body check: Biometric access protection devices and their programs put to the test. ct Magazine, Nov. 2002.
-
(2002)
Ct Magazine
-
-
Thalheim, L.1
Krissler, J.2
-
46
-
-
78650022232
-
Testing metrics for password creation policies by attacking large sets of revealed passwords
-
Oct.
-
M. Weir, S. Aggarwal, M. Collins, and H. Stern. Testing metrics for password creation policies by attacking large sets of revealed passwords. In Proc. of CCS, Oct. 2010.
-
(2010)
Proc. of CCS
-
-
Weir, M.1
Aggarwal, S.2
Collins, M.3
Stern, H.4
-
47
-
-
84866615916
-
-
US 0232567 Patent - Capacitive Sensing Arrangment
-
W. Westerman and J. G. Elias. US 0232567 Patent - Capacitive Sensing Arrangment, 2006.
-
(2006)
-
-
Westerman, W.1
Elias, J.G.2
|