-
2
-
-
84881530400
-
Biometric authentication and identification using keystroke dynamics: A survey
-
S. P. Banerjee and D. Woodard. Biometric authentication and identification using keystroke dynamics: A survey. J. of Pattern Recognition Research, 7(1):116-139, 2012.
-
(2012)
J. of Pattern Recognition Research
, vol.7
, Issue.1
, pp. 116-139
-
-
Banerjee, S.P.1
Woodard, D.2
-
3
-
-
78650165017
-
User authentication through keystroke dynamics
-
Nov.
-
F. Bergadano, D. Gunetti, and C. Picardi. User authentication through keystroke dynamics. ACM Trans. Inf. Syst. Secur., 5(4):367-397, Nov. 2002.
-
(2002)
ACM Trans. Inf. Syst. Secur.
, vol.5
, Issue.4
, pp. 367-397
-
-
Bergadano, F.1
Gunetti, D.2
Picardi, C.3
-
4
-
-
0019053271
-
Comparison of parametric representations for monosyllabic word recognition in continuously spoken sentences
-
S. Davis and P. Mermelstein. Comparison of parametric representations for monosyllabic word recognition in continuously spoken sentences. IEEE Trans. Acoustics, Speech and Signal Processing, 28(4):357-366, Aug. 1980. (Pubitemid 11464930)
-
(1980)
IEEE Transactions on Acoustics, Speech, and Signal Processing
, vol.ASSP-28
, Issue.4
, pp. 357-366
-
-
Davis Steven, B.1
Mermelstein Paul2
-
5
-
-
0742290133
-
An introduction to biometric recognition
-
Jan.
-
A. Jain, A. Ross, and S. Prabhakar. An introduction to biometric recognition. IEEE Trans. CSVT, 14(1):4-20, Jan. 2004.
-
(2004)
IEEE Trans. CSVT
, vol.14
, Issue.1
, pp. 4-20
-
-
Jain, A.1
Ross, A.2
Prabhakar, S.3
-
8
-
-
0038628620
-
Password hardening based on keystroke dynamics
-
F. Monrose, M. Reiter, and S. Wetzel. Password hardening based on keystroke dynamics. International Journal of Information Security, 1(2):69-83, 2002.
-
(2002)
International Journal of Information Security
, vol.1
, Issue.2
, pp. 69-83
-
-
Monrose, F.1
Reiter, M.2
Wetzel, S.3
-
10
-
-
84887454308
-
Continuous and non-intrusive identity verification in real-time environments based on free-text keystroke dynamics
-
T. Mustafic, S. Camtepe, and S. Albayrak. Continuous and non-intrusive identity verification in real-time environments based on free-text keystroke dynamics. In ICJB, 2011.
-
(2011)
ICJB
-
-
Mustafic, T.1
Camtepe, S.2
Albayrak, S.3
-
11
-
-
78649427215
-
Soft biometric traits for continuous user authentication
-
Dec.
-
K. Niinuma, U. Park, and A. K. Jain. Soft biometric traits for continuous user authentication. IEEE Trans. Information Forensics and Security, 5(4):771-780, Dec. 2010.
-
(2010)
IEEE Trans. Information Forensics and Security
, vol.5
, Issue.4
, pp. 771-780
-
-
Niinuma, K.1
Park, U.2
Jain, A.K.3
-
12
-
-
85192902604
-
-
chapter A Survey of User Authentication Based on Mouse Dynamics, Springer Berlin Heidelberg
-
K. Revett, H. Jahankhani, S. T. Magalhes, and H. M. D. Santos. Global E-Security, volume 12 of Communications in Computer and Information Science, chapter A Survey of User Authentication Based on Mouse Dynamics, pages 210-219. Springer Berlin Heidelberg, 2008.
-
(2008)
Global E-security, Volume 12 of Communications in Computer and Information Science
, pp. 210-219
-
-
Revett, K.1
Jahankhani, H.2
Magalhes, S.T.3
Santos, H.M.D.4
-
15
-
-
33947499205
-
Continuous verification using multimodal biometrics
-
DOI 10.1109/TPAMI.2007.1010, Special issue on Biometrics: Progress and Directions
-
T. Sim, S. Zhang, R. Janakiraman, and S. Kumar. Continuous verification using multimodal biometrics. IEEE T-PAMI, 29(4):687-700, Apr. 2007. (Pubitemid 46464408)
-
(2007)
IEEE Transactions on Pattern Analysis and Machine Intelligence
, vol.29
, Issue.4
, pp. 687-700
-
-
Sim, T.1
Zhang, S.2
Janakiraman, R.3
Kumar, S.4
-
16
-
-
78650286294
-
A keystroke biometric systemfor long-text input
-
C. C. Tappert, S.-H. Cha, M. Villani, and R. S. Zack. A keystroke biometric systemfor long-text input. Int. J. of Information Security and Privacy (IJISP), 4(1):32-60, 2010.
-
(2010)
Int. J. of Information Security and Privacy (IJISP)
, vol.4
, Issue.1
, pp. 32-60
-
-
Tappert, C.C.1
Cha, S.-H.2
Villani, M.3
Zack, R.S.4
-
18
-
-
80755187823
-
An efficient user verification system via mouse movements
-
New York, NY, USA, ACM
-
N. Zheng, A. Paloski, and H. Wang. An efficient user verification system via mouse movements. In Proc. of the 18th ACM conference on Computer and communications security, pages 139-150, New York, NY, USA, 2011. ACM.
-
(2011)
Proc. of the 18th ACM Conference on Computer and Communications Security
, pp. 139-150
-
-
Zheng, N.1
Paloski, A.2
Wang, H.3
|