-
1
-
-
34547965365
-
A new biometric technology based on mouse dynamics
-
A.A.E. Ahmed, and I. Traore, "A New Biometric Technology Based on Mouse Dynamics," IEEE Trans. on Dependable and Secure Computing, vol. 4, no. 3, pp. 165-179, 2007.
-
(2007)
IEEE Trans. on Dependable and Secure Computing
, vol.4
, Issue.3
, pp. 165-179
-
-
Ahmed, A.A.E.1
Traore, I.2
-
2
-
-
78650165017
-
User authentication through keystroke dynamics
-
F. Bergadano, D. Guneti, and C. Picardi, "User Authentication through Keystroke Dynamics," ACM Trans. Information and System Security, vol. 5, no. 4, pp. 367-397, 2002.
-
(2002)
ACM Trans. Information and System Security
, vol.5
, Issue.4
, pp. 367-397
-
-
Bergadano, F.1
Guneti, D.2
Picardi, C.3
-
3
-
-
0036887662
-
Biometric perils and patches
-
R. Bolle, J.H. Connell, and N.K. Ratha, "Biometric perils and patches, " Pattern Recognition, vol. 35, pp. 2727-2738, 2002.
-
(2002)
Pattern Recognition
, vol.35
, pp. 2727-2738
-
-
Bolle, R.1
Connell, J.H.2
Ratha, N.K.3
-
4
-
-
33845701766
-
Authenticating mobile phone users using keystroke analysis
-
N. Clarke, and S. Furnell, "Authenticating mobile phone users using keystroke analysis," Int. J. Inf. Secur., vol. 6, pp.1-14, 2007.
-
(2007)
Int. J. Inf. Secur.
, vol.6
, pp. 1-14
-
-
Clarke, N.1
Furnell, S.2
-
5
-
-
84857500845
-
Flexible and transparent user authentication for mobile devices
-
N. Clarke, S. Karatzouni, and S. Furnell, "Flexible and transparent user authentication for mobile devices," IFIP Advances in Information and Communication Technology, 297/2009, 1-12, 2009.
-
(2009)
IFIP Advances in Information and Communication Technology
, vol.297
, Issue.2009
, pp. 1-12
-
-
Clarke, N.1
Karatzouni, S.2
Furnell, S.3
-
6
-
-
79956003691
-
Mind how you answer me!: Transparently authenticating the user of a smartphone when answering or placing a call
-
ACM, New York, NY, USA. March 22-24
-
M. Conti, I. Z. Zlatea, and B. Crispo, "Mind how you answer me!: transparently authenticating the user of a smartphone when answering or placing a call." In Proceedings of the 6th ACM Symposium on Information, Computer, and Communications Security, (ASIACCS '11). ACM, New York, NY, USA. pp. 249-259, March 22-24, 2011.
-
(2011)
Proceedings of the 6th ACM Symposium on Information, Computer, and Communications Security, (ASIACCS '11)
, pp. 249-259
-
-
Conti, M.1
Zlatea, I.Z.2
Crispo, B.3
-
7
-
-
78650426128
-
Improved cycle detection for accelerometer based gait authentication
-
M.O. Derawi, P. Bours, and K. Holien, "Improved Cycle Detection for Accelerometer Based Gait Authentication," Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP), 2010 Sixth International Conference on. pp. 312-317, 2010.
-
(2010)
Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP), 2010 Sixth International Conference On.
, pp. 312-317
-
-
Derawi, M.O.1
Bours, P.2
Holien, K.3
-
8
-
-
37849041688
-
Sheep, goats, lambs and wolves a statistical analysis of speaker performance in the NIST 1998 speaker recognition evaluation
-
G. Doddington, W. Liggett, A. Martin, M. Przybocki, and D. Reynolds, "Sheep, goats, lambs and wolves a statistical analysis of speaker performance in the NIST 1998 speaker recognition evaluation," in 5th International Conference on Spoken Language Processing, 1998.
-
(1998)
5th International Conference on Spoken Language Processing
-
-
Doddington, G.1
Liggett, W.2
Martin, A.3
Przybocki, M.4
Reynolds, D.5
-
9
-
-
84866686545
-
User authentication schemes for mobile and handheld devices
-
M.N. Doja, and N. Kumar, "User authentication schemes for mobile and handheld devices," INFOCOMP Journal of Computer Science, vol. 7, no. 4, pp.38-47, 2008.
-
(2008)
INFOCOMP Journal of Computer Science
, vol.7
, Issue.4
, pp. 38-47
-
-
Doja, M.N.1
Kumar, N.2
-
10
-
-
0031536511
-
Improvements on cross-validation: The .632 + Bootstrap Method
-
June
-
B. Efron, and R. Tibshirani, "Improvements on cross-validation: The .632 + Bootstrap Method," Journal of the American Statistical Association, vol. 92, no. 438, pp. 548-560, June 1997.
-
(1997)
Journal of the American Statistical Association
, vol.92
, Issue.438
, pp. 548-560
-
-
Efron, B.1
Tibshirani, R.2
-
11
-
-
49849102834
-
Beyound the PIN: Enhancing user authentication for mobile devices
-
August
-
S. Furnell, N. Clarke, and S. Karatzouni, "Beyound the PIN: Enhancing user authentication for mobile devices," Computer Fraud & Security, pp. 12-17, August2008
-
(2008)
Computer Fraud & Security
, pp. 12-17
-
-
Furnell, S.1
Clarke, N.2
Karatzouni, S.3
-
12
-
-
51449118740
-
Biometric gait authentication using accelerometer sensor
-
October/November
-
D. Gafurov, K. Helkala, and T. Søndrol, "Biometric Gait Authentication Using Accelerometer Sensor," Journal of Computers, vol. 1, pp.51-59, October/November 2006.
-
(2006)
Journal of Computers
, vol.1
, pp. 51-59
-
-
Gafurov, D.1
Helkala, K.2
Søndrol, T.3
-
15
-
-
70350226710
-
-
and http://developer.android.com/index.html (2011/11/11)
-
Google Inc. Android™ Platform. available from: http://www.android. com/, and http://developer.android.com/index.html (2011/11/11).
-
Android™ Platform
-
-
-
17
-
-
84921312842
-
-
2011/11/28
-
HTC. Smartphone. available from: http://www.htc.com/us/products (2011/11/28).
-
Smartphone
-
-
-
18
-
-
25844484205
-
Identity authentication using improved online signature verification method
-
A. Kholmatov, and B. Yanikoglu, "Identity authentication using improved online signature verification method," Pattern Recognition Letters, vol. 26, no. 15, pp. 2400-2408, 2005.
-
(2005)
Pattern Recognition Letters
, vol.26
, Issue.15
, pp. 2400-2408
-
-
Kholmatov, A.1
Yanikoglu, B.2
-
19
-
-
0036522407
-
FVC2000: Fingerprint verification competition
-
Mar.
-
D. Maio, D. Maltoni, R. Capelli, J.L. Wayman, and A.K. Jain, "FVC2000: Fingerprint Verification Competition," IEEE Trans. Pattern Analysis and Machine Intelligence, vol. 24, no. 3, pp. 402-412, Mar. 2002.
-
(2002)
IEEE Trans. Pattern Analysis and Machine Intelligence
, vol.24
, Issue.3
, pp. 402-412
-
-
Maio, D.1
Maltoni, D.2
Capelli, R.3
Wayman, J.L.4
Jain, A.K.5
-
20
-
-
26944489998
-
An integrated identity verification system for mobile erminals
-
O. Mazhelis, J. Markuula, and J. Veijalainen, "An integrated identity verification system for mobile erminals," Information Management & Computer Security, vol. 13, no. 5, pp. 367-378, 2005.
-
(2005)
Information Management & Computer Security
, vol.13
, Issue.5
, pp. 367-378
-
-
Mazhelis, O.1
Markuula, J.2
Veijalainen, J.3
-
21
-
-
84866670901
-
-
2011/12/23
-
Medtrng.com. Postures and Direction of Movement. available from: http://www.medtrng.com/posturesdirection.htm (2011/12/23).
-
Postures and Direction of Movement
-
-
-
23
-
-
33947511174
-
DCT-based iris recognition
-
D.M. Monro, S. Rakshit, and D. Zhang, "DCT-Based iris recognition," IEEE Transactions on Pattern Analysis and Machine Intelligence, vol. 29, no. 4, pp. 586-595, 2007.
-
(2007)
IEEE Transactions on Pattern Analysis and Machine Intelligence
, vol.29
, Issue.4
, pp. 586-595
-
-
Monro, D.M.1
Rakshit, S.2
Zhang, D.3
-
24
-
-
10044293457
-
Comparing passwords, tokens, and biometrics for user authentication
-
Dec.
-
L. O'Gorman, "Comparing Passwords, Tokens, and Biometrics for User Authentication," Proc. IEEE, vol. 91, no. 12, pp. 2021-2040, Dec. 2003.
-
(2003)
Proc. IEEE
, vol.91
, Issue.12
, pp. 2021-2040
-
-
O'gorman, L.1
-
25
-
-
85192902604
-
A survey of user authentication based on mouse dynamics
-
K. Revett, H. Jahankhani, S. Magalhães, and H. Santos, "A survey of user authentication based on mouse dynamics," Communications in Computer and Information Science (Global E-Security), vol. 12, pp. 210-219, 2008.
-
(2008)
Communications in Computer and Information Science (Global E-Security)
, vol.12
, pp. 210-219
-
-
Revett, K.1
Jahankhani, H.2
Magalhães, S.3
Santos, H.4
-
26
-
-
84255166817
-
SenGuard: Passive user identification on smartphones using multiple sensors
-
Shanghai, China.
-
W. Shi, J. Yang, Y. Jiang, F. Yang, and Y. Xiong, "SenGuard: Passive User Identification on Smartphones Using Multiple Sensors." 2011 IEEE 7th International Conference on Wireless and Mobile Computing, Networking and Communications (WiMob), Shanghai, China. pp. 141-148, 2011.
-
(2011)
2011 IEEE 7th International Conference on Wireless and Mobile Computing, Networking and Communications (WiMob)
, pp. 141-148
-
-
Shi, W.1
Yang, J.2
Jiang, Y.3
Yang, F.4
Xiong, Y.5
-
27
-
-
84866650116
-
-
Press, (2011/11/15)
-
Smart Credit. "Consumer Reports survey on mobile phones and security." 2011 Press. available from: http://www.smartcredit.com/blog/ 2011/09/02/consumer-reports-surveyon-mobile-phones-and-security/ (2011/11/15).
-
(2011)
Consumer Reports Survey on Mobile Phones and Security
-
-
-
29
-
-
47849128948
-
Increasing security of mobile devices by decreasing user effort in verification
-
25-31 Aug.
-
E. Vildjiounaite, S.M. Makela, M. Lindholm, V. Kyllonen, H. Ailisto, "Increasing Security of Mobile Devices by Decreasing User Effort in Verification," Systems and Networks Communications, 2007. ICSNC 2007. Second International Conference on, Cap Esterel, 25-31 Aug. 2007, pp.80-80.
-
(2007)
Systems and Networks Communications, 2007. ICSNC 2007. Second International Conference On, Cap Esterel
, pp. 80-80
-
-
Vildjiounaite, E.1
Makela, S.M.2
Lindholm, M.3
Kyllonen, V.4
Ailisto, H.5
-
30
-
-
84866686546
-
-
2011/12/23
-
VistaLab Technologies, Common Injuries, available from: http://www.vistalab.com/commoninjuries.asp (2011/12/23).
-
Common Injuries
-
-
-
31
-
-
38549176659
-
Palmprint texture analysis using derivative of gaussian filters
-
X. Wu, K. Wang, and D. Zhang, "Palmprint texture analysis using derivative of gaussian filters," in: Proceedings of 2006 International Conferenceon Computational Intelligence and Security, pp.751-754, 2006.
-
(2006)
Proceedings of 2006 International Conferenceon Computational Intelligence and Security
, pp. 751-754
-
-
Wu, X.1
Wang, K.2
Zhang, D.3
-
32
-
-
32944473628
-
Sweep fingerprint sequence reconstruction for portable devices
-
Y.L. Zhang, J. Yang, and H.T. Wu, "Sweep fingerprint sequence reconstruction for portable devices", Electronics Letters, vol. 42, no. 4, pp. 204-205, 2006.
-
(2006)
Electronics Letters
, vol.42
, Issue.4
, pp. 204-205
-
-
Zhang, Y.L.1
Yang, J.2
Wu, H.T.3
|