-
3
-
-
84961346783
-
Smudge attacks on smartphone touch screens
-
A. J. Aviv, K. Gibson, E. Mossop, M. Blaze, and J. M. Smith, "Smudge attacks on smartphone touch screens, " in Proc. 4th USENIX Conf. on Offensive technologies, 2010, pp. 1-10.
-
(2010)
Proc. 4th USENIX Conf. on Offensive Technologies
, pp. 1-10
-
-
Aviv, A.J.1
Gibson, K.2
Mossop, E.3
Blaze, M.4
Smith, J.M.5
-
4
-
-
79955702502
-
LIBSVM: A library for support vector machines
-
C.-C. Chang and C.-J. Lin, "LIBSVM: A library for support vector machines, " ACM Transactions on Intelligent Systems and Technology, vol. 2, no. 3, 27:1-27, 2011.
-
(2011)
ACM Transactions on Intelligent Systems and Technology
, vol.2-27
, Issue.3
, pp. 1-27
-
-
Chang, C.-C.1
Lin, C.-J.2
-
5
-
-
79956003691
-
Mind how you answer me!: Transparently authenticating the user of a smartphone when answering or placing a call
-
M. Conti, I. Zachia-Zlatea, and B. Crispo, "Mind how you answer me!: Transparently authenticating the user of a smartphone when answering or placing a call, " in Proc. ACM Symposium on Information, Computer and Communications Security, 2011, pp. 249-259.
-
(2011)
Proc. ACM Symposium on Information, Computer and Communications Security
, pp. 249-259
-
-
Conti, M.1
Zachia-Zlatea, I.2
Crispo, B.3
-
6
-
-
51449118740
-
Biometric gait authentication using accelerometer sensor
-
D. Gafurov, K. Helkala, and T. Søndrol, "Biometric gait authentication using accelerometer sensor, " Journal of computers, vol. 1, no. 7, pp. 51-59, 2006.
-
(2006)
Journal of Computers
, vol.1
, Issue.7
, pp. 51-59
-
-
Gafurov, D.1
Helkala, K.2
Søndrol, T.3
-
7
-
-
84944178665
-
Hierarchical grouping to optimize an objective function
-
J. Joe H. Ward, "Hierarchical grouping to optimize an objective function, " Journal of the American statistical association, vol. 58, no. 301, pp. 236-244, 1963.
-
(1963)
Journal of the American Statistical Association
, vol.58
, Issue.301
, pp. 236-244
-
-
Ward, J.J.H.1
-
8
-
-
0037822222
-
Asymptotic behaviors of support vector machines with gaussian kernel
-
S. S. Keerthi and C.-J. Lin, "Asymptotic behaviors of support vector machines with gaussian kernel, " Neural computation, vol. 15, no. 7, pp. 1667-1689, 2003.
-
(2003)
Neural Computation
, vol.15
, Issue.7
, pp. 1667-1689
-
-
Keerthi, S.S.1
Lin, C.-J.2
-
9
-
-
84887110609
-
Touch me once and I know it's you: Implicit authentication based on touch screen patterns
-
A. D. Luca, A. Hang, F. Brudy, C. Lindner, and H. Hussmann, "Touch me once and I know it's you!: implicit authentication based on touch screen patterns, " in Proc. ACM (SIGCHI), 2012.
-
(2012)
Proc. ACM (SIGCHI)
-
-
Luca, A.D.1
Hang, A.2
Brudy, F.3
Lindner, C.4
Hussmann, H.5
-
11
-
-
78650402528
-
Cell phone-based biometric identification
-
J. Kwapisz, G. Weiss, and S. Moore, "Cell phone-based biometric identification, " in Proc. IEEE Int. Conf. on Biometrics: Theory Applications and Systems, 2010, pp. 1-7.
-
(2010)
Proc. IEEE Int. Conf. on Biometrics: Theory Applications and Systems
, pp. 1-7
-
-
Kwapisz, J.1
Weiss, G.2
Moore, S.3
-
12
-
-
33646811518
-
Identifying users of portable devices from gait pattern with accelerometers
-
J. Mantyjarvi, M. Lindholm, E. Vildjiounaite, S. Makela, and H. Ailisto, "Identifying users of portable devices from gait pattern with accelerometers, " in Proc. IEEE Int. Conf. on Acoustics, Speech, and Signal Processing, 2005.
-
(2005)
Proc. IEEE Int. Conf. on Acoustics, Speech, and Signal Processing
-
-
Mantyjarvi, J.1
Lindholm, M.2
Vildjiounaite, E.3
Makela, S.4
Ailisto, H.5
-
13
-
-
0033281372
-
Password hardening based on keystroke dynamics
-
F. Monrose, M. K. Reiter, and S. Wetzel. Password hardening based on keystroke dynamics. In Proc. ACM CCS, pages 73 - 82, 1999.
-
(1999)
Proc. ACM CCS
, pp. 73-82
-
-
Monrose, F.1
Reiter, M.K.2
Wetzel, S.3
-
14
-
-
84887061995
-
Biometric-rich gestures: A novel approach to authentication on multi-touch device
-
N. Sae-Bae, K. Ahmed, K. Isbister, and N. Memon. Biometric-rich gestures: A novel approach to authentication on multi-touch device. In Proc. ACM SIGCHI, 2012.
-
(2012)
Proc. ACM SIGCHI
-
-
Sae-Bae, N.1
Ahmed, K.2
Isbister, K.3
Memon, N.4
-
15
-
-
84871587582
-
Password entry usability and shoulder surfing susceptibility on different smartphone platforms
-
F. Schaub, R. Deyhle, and M. Weber, "Password entry usability and shoulder surfing susceptibility on different smartphone platforms, " in Proc. Mobile & Ubiquitous Multimedia, 2012.
-
(2012)
Proc. Mobile & Ubiquitous Multimedia
-
-
Schaub, F.1
Deyhle, R.2
Weber, M.3
-
16
-
-
0000487102
-
Estimating the support of a high-dimensional distribution
-
B. Scḧolkopf, J. C. Platt, J. Shawe-Taylor, A. J. Smola, and R. C. Williamson, "Estimating the support of a high-dimensional distribution, " Neural computation, vol. 13, no. 7, 2001.
-
(2001)
Neural Computation
, vol.13
, Issue.7
-
-
Scḧolkopf, B.1
Platt, J.C.2
Shawe-Taylor, J.3
Smola, A.J.4
Williamson, R.C.5
-
17
-
-
72749090100
-
A hybrid GA-PSO fuzzy system for user identification on smart phones
-
M. Shahzad, S. Zahid, and M. Farroq, "A hybrid GA-PSO fuzzy system for user identification on smart phones, " in Proc. GECCO, 2009, pp. 1617-1624.
-
(2009)
Proc. GECCO
, pp. 1617-1624
-
-
Shahzad, M.1
Zahid, S.2
Farroq, M.3
-
18
-
-
34250782167
-
A comparison of perceived and real shoulder-surfing risks between alphanumeric and graphical passwords
-
F. Tari, A. Ozok, and S. Holden, "A comparison of perceived and real shoulder-surfing risks between alphanumeric and graphical passwords, " in Proc. SOUPS, 2006, pp. 56-66.
-
(2006)
Proc. SOUPS
, pp. 56-66
-
-
Tari, F.1
Ozok, A.2
Holden, S.3
-
19
-
-
80052591004
-
Keystroke-based user identification on smart phones
-
S. Zahid, M. Shahzad, S. A. Khayam, and M. Farooq, "Keystroke-based user identification on smart phones, " in Proc. RAID, 2009.
-
(2009)
Proc. RAID
-
-
Zahid, S.1
Shahzad, M.2
Khayam, S.A.3
Farooq, M.4
-
20
-
-
84887121835
-
-
Technical report, College of William and Mary
-
N. Zheng, K. Bai, H. Huang, and H. Wang. You are how you touch: User verification on smartphones via tapping behaviors. Technical report, College of William and Mary, 2012.
-
(2012)
You are How you Touch: User Verification on Smartphones via Tapping Behaviors
-
-
Zheng, N.1
Bai, K.2
Huang, H.3
Wang, H.4
|