-
1
-
-
84904331341
-
-
Cellular Online. September
-
Cellular Online. September 2002. www.cellular.co.za
-
(2002)
-
-
-
3
-
-
84904337252
-
Huge surge in mobile phone thefts
-
th January 2002
-
th January 2002. http://news/bbc.co.uk/hi/english/uk/newsid_1748000/1748258.htm
-
(2002)
BBC News Report
-
-
-
4
-
-
0036276843
-
Acceptance of subscriber authentication methods for mobile telephony devices
-
Clarke, N.L., Furnell, S.M., Rodwell, P.M. and Reynolds, P.L. 2002. "Acceptance of subscriber authentication methods for mobile telephony devices". Computers & Security, vol. 21, no.3, pp. 220-228.
-
(2002)
Computers & Security
, vol.21
, Issue.3
, pp. 220-228
-
-
Clarke, N.L.1
Furnell, S.M.2
Rodwell, P.M.3
Reynolds, P.L.4
-
5
-
-
84962405651
-
The Use of Passwords for controlling the Access to Remote Computer Systems and Services
-
Wood, H.M. 1978. "The Use of Passwords for controlling the Access to Remote Computer Systems and Services". Computers & Security, vol. 3.
-
(1978)
Computers & Security
, vol.3
-
-
Wood, H.M.1
-
7
-
-
33845704966
-
Subscriber Authentication for Mobile Phones using Keystroke Dynamics
-
Plymouth, UK
-
Clarke, N.L., Furnell, S.M., Lines, B., Reynolds, P.L. 2002. "Subscriber Authentication for Mobile Phones using Keystroke Dynamics". Proceedings of the Third International Network Conference (INC 2002), Plymouth, UK. pp.347-355.
-
(2002)
Proceedings of the Third International Network Conference (INC 2002)
, pp. 347-355
-
-
Clarke, N.L.1
Furnell, S.M.2
Lines, B.3
Reynolds, P.L.4
-
10
-
-
0025384135
-
Identity Authorisation Based on Keystroke Latencies
-
Joyce, R., Gupta, G. 1990. "Identity Authorisation Based on Keystroke Latencies". Communications of the ACM, 33(2): 168-176.
-
(1990)
Communications of the ACM
, vol.33
, Issue.2
, pp. 168-176
-
-
Joyce, R.1
Gupta, G.2
-
11
-
-
0039921279
-
User Identification via Keystroke Characteristics of Typed Names using Neural Networks
-
Brown, M., Rogers, J. 1993. "User Identification via Keystroke Characteristics of Typed Names using Neural Networks". International Journal of Man- Machine Studies, vol. 39, pp 999-1014.
-
(1993)
International Journal of Man- Machine Studies
, vol.39
, pp. 999-1014
-
-
Brown, M.1
Rogers, J.2
-
12
-
-
0029350834
-
Keyboard User Verification: Toward an Accurate, Efficient and Ecologically Valid Algorithm
-
Napier, R., Laverty, W., Mahar, D., Henderson, R., Hiron, M., Wagner, M. 1995. "Keyboard User Verification: Toward an Accurate, Efficient and Ecologically Valid Algorithm". International Journal of Human-Computer Studies, vol.43, pp 213-222.
-
(1995)
International Journal of Human-Computer Studies
, vol.43
, pp. 213-222
-
-
Napier, R.1
Laverty, W.2
Mahar, D.3
Henderson, R.4
Hiron, M.5
Wagner, M.6
-
13
-
-
0034140431
-
Keystroke Dynamics as a Biometric for Authentication
-
Monrose, R., Rubin, A. 1999. "Keystroke Dynamics as a Biometric for Authentication". Future Generation Computer Systems, 16(4) pp 351-359.
-
(1999)
Future Generation Computer Systems
, vol.16
, Issue.4
, pp. 351-359
-
-
Monrose, R.1
Rubin, A.2
-
14
-
-
0005327658
-
Web Based Keystroke Dynamics Identity Verification Using Neural Networks
-
Cho, S., Han, C., Han D., Kin, H. 2000. "Web Based Keystroke Dynamics Identity Verification Using Neural Networks". Journal of Organisational Computing & Electronic Commerce, vol. 10, pp 295-307.
-
(2000)
Journal of Organisational Computing & Electronic Commerce
, vol.10
, pp. 295-307
-
-
Cho, S.1
Han, C.2
Han, D.3
Kin, H.4
-
15
-
-
0028423041
-
A Multilayer Neural Network System for Computer Access Security
-
Obaidat, M., Macchairolo, D. 1994. "A Multilayer Neural Network System for Computer Access Security". IEEE Transactions on Systems, Man, and Cybernetics, vol. 24, no. 5, pp. 806-813.
-
(1994)
IEEE Transactions On Systems, Man, and Cybernetics
, vol.24
, Issue.5
, pp. 806-813
-
-
Obaidat, M.1
Macchairolo, D.2
-
16
-
-
0031121887
-
Verification of Computer Uses Using Keystroke Dynamics
-
Obaidat M., Sadoun, B. 1997. "Verification of Computer Uses Using Keystroke Dynamics". IEEE Transactions on Systems, Man, and Cybernetics - Part B: Cybernetics, vol. 27, no. 2, pp.261-269.
-
(1997)
IEEE Transactions On Systems, Man, and Cybernetics - Part B: Cybernetics
, vol.27
, Issue.2
, pp. 261-269
-
-
Obaidat, M.1
Sadoun, B.2
-
23
-
-
0009344027
-
Biometric Systems of Access Control
-
Cope, B. 1990. "Biometric Systems of Access Control". Electrotechnology, April/May: 71-74.
-
(1990)
Electrotechnology, April/May
, pp. 71-74
-
-
Cope, B.1
-
24
-
-
0032021402
-
Computer User Verification Using Login String Keystroke Dynamics
-
Robinson, J., Liang, V., Chambers, J., MacKenzie, C. 1998. "Computer User Verification Using Login String Keystroke Dynamics". IEEE Transactions on Systems, Man, and Cybernetics - Part A: Systems and Humans, vol. 28, no.2, pp. 236-241
-
(1998)
IEEE Transactions On Systems, Man, and Cybernetics - Part A: Systems and Humans
, vol.28
, Issue.2
, pp. 236-241
-
-
Robinson, J.1
Liang, V.2
Chambers, J.3
Mackenzie, C.4
|