-
1
-
-
84872112821
-
-
Norton Survey Reveals One in Three Experience Cell Phone Loss, Theft, Norton Feb. 8
-
Norton Survey Reveals One in Three Experience Cell Phone Loss, Theft, Norton, Feb. 8, 2011 [Online]. Available: http://www.symantec. com/about/news/release/article.jsp?prid=20110208-01
-
(2011)
-
-
-
2
-
-
84872111892
-
-
Survey Says 70% Don't Password-Protect Mobiles: Download Free Mobile Toolkit, Sophos Naked Security blog, Aug. 9
-
Survey Says 70% Don't Password-Protect Mobiles: Download Free Mobile Toolkit, Sophos Naked Security blog, Aug. 9, 2011 [Online]. Available: http://nakedsecurity.sophos.com/2011/08/09/free-sophosmobile- security-toolkit/
-
(2011)
-
-
-
3
-
-
84961346783
-
Smudge attacks on smartphone touch screens
-
Berkeley, CA, USENIX Association
-
A. J. Aviv, K. Gibson, E.Mossop, M. Blaze, and J.M. Smith, "Smudge attacks on smartphone touch screens," in Proc. 4th USENIX Conf. Offensive technologies (WOOT'10), Berkeley, CA, 2010, pp. 1-7 [Online]. Available: http://dl.acm.org/citation.cfm?id=1925004.1925009, USENIX Association
-
(2010)
Proc. 4th USENIX Conf. Offensive Technologies (WOOT'10)
, pp. 1-7
-
-
Aviv, A.J.1
Gibson, K.2
Mossop, E.3
Blaze, M.4
Smith, J.M.5
-
4
-
-
84872122005
-
-
Lost and Found: The Challenges of Finding Your Lost or Stolen Phone, Lookout Mobile Security's The Lookout Blog, Jul. 12
-
Lost and Found: The Challenges of Finding Your Lost or Stolen Phone, Lookout Mobile Security's The Lookout Blog, Jul. 12, 2011 [Online]. Available: http://blog.mylookout.com/blog/2011/07/12/
-
(2011)
-
-
-
5
-
-
84872101978
-
-
Smart Phones Overtake Client PCs in 2011, Canalys Feb.
-
Smart Phones Overtake Client PCs in 2011, Canalys, Feb. 2012 [Online]. Available: http://www.canalys.com/newsroom/smart-honesovertake- client-cs-2011
-
(2012)
-
-
-
6
-
-
33744779400
-
Biometrics: A tool for information security
-
DOI 10.1109/TIFS.2006.873653
-
A. Jain, A. Ross, and S. Pankanti, "Biometrics: A tool for information security," IEEE Trans. Inf. Forensics Security, vol. 1, no. 2, pp. 125-143, Jun. 2006. (Pubitemid 43824625)
-
(2006)
IEEE Transactions on Information Forensics and Security
, vol.1
, Issue.2
, pp. 125-143
-
-
Jain, A.K.1
Ross, A.2
Pankanti, S.3
-
7
-
-
70350234989
-
Behavioural biometrics; A survey and classification
-
Jun
-
R. V. Yampolskiy and V. Govindaraju, "Behavioural biometrics; a survey and classification," Int. J. Biometrics, vol. 1, no. 1, pp. 81-113, Jun. 2008.
-
(2008)
Int. J. Biometrics
, vol.1
, Issue.1
, pp. 81-113
-
-
Yampolskiy, R.V.1
Govindaraju, V.2
-
8
-
-
78650503546
-
Unobtrusive user-authentication on mobile phones using biometric gait recognition
-
Oct.
-
M. Derawi, C. Nickel, P. Bours, and C. Busch, "Unobtrusive user-authentication on mobile phones using biometric gait recognition," in Proc. 6th Int. Conf. Intelligent Information Hiding and Multimedia Signal Processing, Oct. 2010, pp. 306-311.
-
(2010)
Proc. 6th Int. Conf. Intelligent Information Hiding and Multimedia Signal Processing
, pp. 306-311
-
-
Derawi, M.1
Nickel, C.2
Bours, P.3
Busch, C.4
-
9
-
-
12844256823
-
Keyboard apparatus for personal identification
-
R. Spillane, "Keyboard apparatus for personal identification," IBM Tech. Disclosure Bull., vol. 17, no. 3346, 1975.
-
(1975)
IBM Tech. Disclosure Bull.
, vol.17
, Issue.3346
-
-
Spillane, R.1
-
10
-
-
0042585206
-
Keystroke dynamics based authentication
-
A. K. Jain, R. Bolle, and S. Pankanti, Eds New York: Springer
-
M. S. Obaidat and B. Sadoun, "Keystroke dynamics based authentication," in Biometrics, A. K. Jain, R. Bolle, and S. Pankanti, Eds. New York: Springer, 2002, pp. 213-229.
-
(2002)
Biometrics
, pp. 213-229
-
-
Obaidat, M.S.1
Sadoun, B.2
-
11
-
-
33847652928
-
Advanced user authentication for mobile devices
-
DOI 10.1016/j.cose.2006.08.008, PII S0167404806001428
-
N. Clarke and S. Furnell, "Advanced user authentication for mobile devices," Comput. Security, vol. 26, no. 2, pp. 109-119, 2007. (Pubitemid 46367239)
-
(2007)
Computers and Security
, vol.26
, Issue.2
, pp. 109-119
-
-
Clarke, N.L.1
Furnell, S.M.2
-
12
-
-
0033281372
-
Password hardening based on keystroke dynamics
-
F. Monrose, M. K. Reiter, and S. Wetzel, "Password hardening based on keystroke dynamics," in Proc. 6th ACM Conf. Computer and Communications Security (CCS '99), New York, 1999, pp. 73-82, ACM. (Pubitemid 32213902)
-
(1999)
Proceedings of the ACM Conference on Computer and Communications Security
, pp. 73-82
-
-
Monrose Fabian1
Reiter Michael, K.2
Wetzel Susanne3
-
13
-
-
0025384135
-
Identity authentication based on keystroke latencies
-
DOI 10.1145/75577.75582
-
R. Joyce and G. Gupta, "Identity authentication based on keystroke latencies," Commun. ACM, vol. 33, no. 2, pp. 168-176, Feb. 1990. (Pubitemid 20657223)
-
(1990)
Communications of the ACM
, vol.33
, Issue.2
, pp. 168-176
-
-
Joyce Rick1
Gupta Gopal2
-
14
-
-
84872102729
-
Multi-modal biometric authentication on the SecurePhone PDA
-
Toulouse, France
-
J. Koreman, A. C. Morris, D. Wu, S. Jassim, H. Sellahewa, J. Ehlers, G. Chollet, G. Aversano, H. Bredin, S. Garcia-salicetti, L. Allano, B. L. Van, and B. Dorizzi, "Multi-modal biometric authentication on the SecurePhone PDA," in Proc. Multi-Modal User Authentication Workshop, Toulouse, France, 2006.
-
(2006)
Proc. Multi-Modal User Authentication Workshop
-
-
Koreman, J.1
Morris, A.C.2
Wu, D.3
Jassim, S.4
Sellahewa, H.5
Ehlers, J.6
Chollet, G.7
Aversano, G.8
Bredin, H.9
Garcia-Salicetti, S.10
Allano, L.11
Van, B.L.12
Dorizzi, B.13
-
15
-
-
84872108259
-
-
Carleton University, Tech. Rep. TR-09-09
-
R. Biddle, S. Chiasson, and P. van Oorschot, Graphical Passwords: Learning From the First Generation, School of Computer Science, Carleton University, Tech. Rep. TR-09-09, 2009.
-
(2009)
Graphical Passwords: Learning from the First Generation, School of Computer Science
-
-
Biddle, R.1
Chiasson, S.2
Van Oorschot, P.3
-
16
-
-
84872103730
-
-
B. V. K. V. Kumar, S. Prabhakar, and A. A. Ross, Eds. Bellingham, WA: SPIE
-
K. Niinuma and A. K. Jain, Continuous User Authentication Using Temporal Information, B. V. K. V. Kumar, S. Prabhakar, and A. A. Ross, Eds. Bellingham, WA: SPIE, 2010, vol. 7667, no. 1.
-
Continuous User Authentication Using Temporal Information
, vol.7667
, Issue.1
, pp. 2010
-
-
Niinuma, K.1
Jain, A.K.2
-
17
-
-
62949238252
-
User authentication using combination of behavioral biometrics over the touchpad acting like touch screen of mobile device
-
Dec.
-
H. Saevanee and P. Bhatarakosol, "User authentication using combination of behavioral biometrics over the touchpad acting like touch screen of mobile device," in Proc. Int. Conf. Computer and Electrical Engineering (ICCEE 2008), Dec. 2008, pp. 82-86.
-
(2008)
Proc. Int. Conf. Computer and Electrical Engineering (ICCEE 2008)
, pp. 82-86
-
-
Saevanee, H.1
Bhatarakosol, P.2
-
19
-
-
77958105748
-
Improving mouse dynamics biometric performance using variance reduction via extractors with separate features
-
Nov
-
Y. Nakkabi, I. Traoré, and A. A. E. Ahmed, "Improving mouse dynamics biometric performance using variance reduction via extractors with separate features," IEEE Trans. Syst.,Man, Cybern. A, vol. 40, no. 6, pp. 1345-1353, Nov. 2010.
-
(2010)
IEEE Trans. Syst.,Man, Cybern. A
, vol.40
, Issue.6
, pp. 1345-1353
-
-
Nakkabi, Y.1
Traoré, I.2
Ahmed, A.A.E.3
-
20
-
-
8844279221
-
A behavioral biometric system based on human-computer interaction
-
H. Gamboa and A. Fred, "A behavioral biometric system based on human-computer interaction," in Proc. SPIE, 2004, vol. 5404, pp. 381-381.
-
(2004)
Proc. SPIE
, vol.5404
, pp. 381-381
-
-
Gamboa, H.1
Fred, A.2
-
21
-
-
80755187823
-
An efficient user verification system via mouse movements
-
New York ACM
-
N. Zheng, A. Paloski, and H. Wang, "An efficient user verification system via mouse movements," in Proc. 18th ACM Conf. Computer and Communications Security (CCS '11), New York, 2011, pp. 139-150, ACM.
-
(2011)
Proc. 18th ACM Conf. Computer and Communications Security (CCS '11)
, pp. 139-150
-
-
Zheng, N.1
Paloski, A.2
Wang, H.3
-
22
-
-
79956040654
-
On mouse dynamics as a behavioral biometric for authentication
-
New York, ACM
-
Z. Jorgensen and T. Yu, "On mouse dynamics as a behavioral biometric for authentication," in Proc. 6th ACM Symp. Information, Computer and Communications Security (ASIACCS '11), New York, 2011, pp. 476-482, ACM.
-
(2011)
Proc. 6th ACM Symp. Information, Computer and Communications Security (ASIACCS '11)
, pp. 476-482
-
-
Jorgensen, Z.1
Yu, T.2
-
23
-
-
33745449771
-
Anomaly intrusion detection based on biometrics
-
DOI 10.1109/IAW.2005.1495997, 1495997, Proceedings from the Sixth Annual IEEE System, Man and Cybernetics Information Assurance Workshop, SMC 2005
-
A. Ahmed and I. Traore, "Anomaly intrusion detection based once biometrics," in Proc. 6th Ann. IEEE SMC Information Assurance Workshop, 2005 (IAW '05), Jun. 2005, pp. 452-453. (Pubitemid 43948767)
-
(2005)
Proceedings from the 6th Annual IEEE System, Man and Cybernetics Information Assurance Workshop, SMC 2005
, vol.2005
, pp. 452-453
-
-
Ahmed, A.A.E.1
Traore, I.2
-
24
-
-
0030173701
-
Reliable on-line human signature verification systems
-
L. L. Lee, T. Berger, and E. Aviczer, "Reliable on-line human signature verification systems," IEEE Trans. Pattern Anal.Mach. Intell., vol. 18, no. 6, pp. 643-647, Jun. 1996. (Pubitemid 126773900)
-
(1996)
IEEE Transactions on Pattern Analysis and Machine Intelligence
, vol.18
, Issue.6
, pp. 643-647
-
-
Lee, L.L.1
Berger, T.2
Aviczer, E.3
-
25
-
-
0036887670
-
On-line signature verification
-
Pattern Recognition in Information Systems
-
A. K. Jain, F. D. Griess, and S. D. Connell, "On-line signature verification," Pattern Recognit., vol. 35, no. 12, pp. 2963-2972, 2002, Pattern Recognition in Information Systems.
-
(2002)
Pattern Recognit.
, vol.35
, Issue.12
, pp. 2963-2972
-
-
Jain, A.K.1
Griess, F.D.2
Connell, S.D.3
-
26
-
-
26444498516
-
An on-line signature verification system based on fusion of local and global information
-
Audio - and Video-Based Biometric Person Authentication: 5th International Conference, AVBPA 2005. Proceedings
-
J. Fierrez-Aguilar, L. Nanni, J. Lopez-Peñalba, J. Ortega-Garcia, and D. Maltoni, "An on-line signature verification system based on fusion of local and global information," in Proc. 5th Int. Conf. Audio- and Video-Based Biometric Person Authentication (AVBPA'05), 2005, pp. 523-532, Springer. (Pubitemid 41423069)
-
(2005)
Lecture Notes in Computer Science
, vol.3546
, pp. 523-532
-
-
Fieriez-Aguilar, J.1
Nanni, L.2
Lopez-Penalba, J.3
Ortega-Garcia, J.4
Maltoni, D.5
-
27
-
-
84862081075
-
Biometric-rich gestures: A novel approach to authentication on multi-touch devices
-
ACM
-
N. Sae-Bae, K. Ahmed, K. Isbister, and N. Memon, "Biometric-rich gestures: A novel approach to authentication on multi-touch devices," in Proc. ACM Ann. Conf. Human Factors in Computing Systems, 2012, pp. 977-986, ACM.
-
(2012)
Proc. ACM Ann. Conf. Human Factors in Computing Systems
, pp. 977-986
-
-
Sae-Bae, N.1
Ahmed, K.2
Isbister, K.3
Memon, N.4
-
28
-
-
84862067265
-
Touch me once and i know it's you!: Implicit authentication based on touch screen patterns
-
ACM
-
A. De Luca, A. Hang, F. Brudy, C. Lindner, and H. Hussmann, "Touch me once and i know it's you!: Implicit authentication based on touch screen patterns," in Proc. ACM Ann. Conf. Human Factors in Computing Systems, 2012, pp. 987-996, ACM.
-
(2012)
Proc. ACM Ann. Conf. Human Factors in Computing Systems
, pp. 987-996
-
-
De Luca, A.1
Hang, A.2
Brudy, F.3
Lindner, C.4
Hussmann, H.5
-
29
-
-
84981731401
-
-
ser. Wiley Series in Probability and Statistics. Hoboken, NJ: Wiley
-
K. V.Mardia and P. E. Jupp, Directional Statistics, ser. Wiley Series in Probability and Statistics. Hoboken, NJ: Wiley, 2000.
-
(2000)
Directional Statistics
-
-
Mardia, K.V.1
Jupp, P.E.2
-
30
-
-
33745561205
-
An introduction to variable and feature selection
-
Mar.
-
I. Guyon and A. Elisseeff, "An introduction to variable and feature selection," J. Mach. Learn. Res., vol. 3, pp. 1157-1182, Mar. 2003.
-
(2003)
J. Mach. Learn. Res.
, vol.3
, pp. 1157-1182
-
-
Guyon, I.1
Elisseeff, A.2
-
31
-
-
84945709355
-
An algorithm for finding best matches in logarithmic expected time
-
Sep
-
J. H. Friedman, J. L. Bentley, and R. A. Finkel, "An algorithm for finding best matches in logarithmic expected time," ACM Trans. Math. Softw., vol. 3, no. 3, pp. 209-226, Sep. 1977.
-
(1977)
ACM Trans. Math. Softw.
, vol.3
, Issue.3
, pp. 209-226
-
-
Friedman, J.H.1
Bentley, J.L.2
Finkel, R.A.3
-
32
-
-
34249753618
-
Support-vector networks
-
C. Cortes and V. Vapnik, "Support-vector networks," Mach. Learning, vol. 20, pp. 273-297, 1995.
-
(1995)
Mach. Learning
, vol.20
, pp. 273-297
-
-
Cortes, C.1
Vapnik, V.2
-
33
-
-
0026966646
-
A training algorithm for optimal margin classifiers
-
ACM
-
B. E. Boser, I. M. Guyon, and V. N. Vapnik, "A training algorithm for optimal margin classifiers," in Proc. 5th Ann. Workshop on Computational Learning Theory (COLT '92), 1992, pp. 144-152, ACM.
-
(1992)
Proc. 5th Ann. Workshop on Computational Learning Theory (COLT '92)
, pp. 144-152
-
-
Boser, B.E.1
Guyon, I.M.2
Vapnik, V.N.3
-
34
-
-
84869846896
-
Smartphones: Not smart enough?
-
New York
-
I. Fischer, C. Kuo, L. Huang, and M. Frank, "Smartphones: Not smart enough?," in Proc. 2nd ACM CCS Workshop on Security and Privacy in Mobile Devices (SPSM '12), New York, 2012.
-
(2012)
Proc. 2nd ACM CCS Workshop on Security and Privacy in Mobile Devices (SPSM '12)
-
-
Fischer, I.1
Kuo, C.2
Huang, L.3
Frank, M.4
|