-
1
-
-
84892172061
-
-
Apr
-
AdmitOneSecurity. (Apr 2013). http://www. admitonesecurity. com/
-
(2013)
-
-
-
2
-
-
84892142780
-
-
Apr
-
AuthenWare. (Apr 2013). http://www. authenware. com/
-
(2013)
-
-
-
4
-
-
84892156913
-
-
Apr
-
bioChec. (Apr 2013). http://www. biochec. com/
-
(2013)
-
-
-
5
-
-
10044297649
-
-
New York: Springer
-
R. Bolle, J. Connell, S. Pankanti, N. Ratha, and A. Senior, Guide to biometrics. New York: Springer, 2004.
-
(2004)
Guide to Biometrics
-
-
Bolle, R.1
Connell, J.2
Pankanti, S.3
Ratha, N.4
Senior, A.5
-
6
-
-
84892185559
-
-
Apr
-
DeepnetSecurity. (Apr 2013). http://www. deepnetsecurity. com/
-
(2013)
-
-
-
7
-
-
2942623033
-
Sheep, goats, lambs, and wolves: A statistical analysis of speaker performance
-
Sydney, Australia
-
G. Doddington, W. Liggett, A. Martin, M. Przybocki, and D. Reynolds, "Sheep, goats, lambs, and wolves: A statistical analysis of speaker performance. Proc. IC-SLD'98, NIST 1998 speaker recognition evaluation, Sydney, Australia, 1998.
-
(1998)
Proc. IC-SLD'98, NIST 1998 Speaker Recognition Evaluation
-
-
Doddington, G.1
Liggett, W.2
Martin, A.3
Przybocki, M.4
Reynolds, D.5
-
11
-
-
84892145430
-
-
Apr
-
IDControl. (Apr 2013). http://www. idcontrol. com/
-
(2013)
-
-
-
12
-
-
79953896884
-
Keystroke dynamics: A software based biometric solution
-
L. Jin, X. Ke, R. Manual, and M. Wilkerson, "Keystroke dynamics: A software based biometric solution," 13th USENIX Sec. Sym., 2004.
-
(2004)
13th USENIX Sec. Sym
-
-
Jin, L.1
Ke, X.2
Manual, R.3
Wilkerson, M.4
-
13
-
-
78751634242
-
Biometric personal authentication using keystroke dynamics: A review
-
M. Karnan, M. Akila, and N. Krishnaraj, "Biometric personal authentication using keystroke dynamics: A review," Applied Soft Computing J., vol. 11, 2011.
-
(2011)
Applied Soft Computing J
, vol.11
-
-
Karnan, M.1
Akila, M.2
Krishnaraj, N.3
-
14
-
-
84892155733
-
-
Apr
-
KeyTrac. (Apr 2013). http://www. keytrac. de/
-
(2013)
-
-
-
16
-
-
84862927413
-
Study on the BeiHang keystroke dynamics database
-
Washington, D. C
-
Y. Li, B. Zhang, Y. Cao, S. Zhao, Y. Gao, and J. Liu, "Study on the BeiHang keystroke dynamics database," Int. Joint Conf. Biometrics (IJCB 2011), Washington, D. C., 2011.
-
(2011)
Int. Joint Conf. Biometrics (IJCB 2011)
-
-
Li, Y.1
Zhang, B.2
Cao, Y.3
Zhao, S.4
Gao, Y.5
Liu, J.6
-
18
-
-
84856098360
-
Continuous and non-intrusive identity verification in real-time environments based on free-text keystroke dynamics
-
Wash. D. C
-
A. Messerman, T. Mustafic, S. Camtepe, and S. Albayrak, "Continuous and non-intrusive identity verification in real-time environments based on free-text keystroke dynamics," Proc. Int. Joint Conf. Biometrics (IJCB 2011), Wash. D. C., 2011.
-
(2011)
Proc. Int. Joint Conf. Biometrics (IJCB 2011)
-
-
Messerman, A.1
Mustafic, T.2
Camtepe, S.3
Albayrak, S.4
-
19
-
-
84868597542
-
Developing a keystroke biometric system for continual authentication of computer users
-
Denmark
-
J. V. Monaco, N. Bakelman, S. Cha, and C. C. Tappert, "Developing a keystroke biometric system for continual authentication of computer users," Proc. Euro. Intell. Sec. Inform. Conf., Denmark, 2012, pp. 210-216.
-
(2012)
Proc. Euro. Intell. Sec. Inform. Conf.
, pp. 210-216
-
-
Monaco, J.V.1
Bakelman, N.2
Cha, S.3
Tappert, C.C.4
-
20
-
-
0038628620
-
Password hardening based on keystroke dynamics
-
F. Montrose, M. K. Reiter, and S. Wetzel. "Password hardening based on keystroke dynamics. " Int. J. Info. Security, 1(2): 69-83, 2002.
-
(2002)
Int. J. Info. Security
, vol.1
, Issue.2
, pp. 69-83
-
-
Montrose, F.1
Reiter, M.K.2
Wetzel, S.3
-
21
-
-
12844274372
-
Typing patterns: A key to user identification
-
A. Peacock, X. Ke, and M. Wilkerson, "Typing patterns: A key to user identification," IEEE Security & Privacy, vol. 2, 2004, pp. 40-47.
-
(2004)
IEEE Security & Privacy
, vol.2
, pp. 40-47
-
-
Peacock, A.1
Ke, X.2
Wilkerson, M.3
-
23
-
-
33744965791
-
Biometric access control through numerical keyboards based on keystroke dynamics
-
R. N. Rodrigues, G. F. G. Yared, C. R. Costa, J. B. T. Yabu-Uti, F. Violaro, and L. L. Ling. "Biometric access control through numerical keyboards based on keystroke dynamics. " Lecture Notes Comp. Sci., 3832: 640-646, 2006.
-
(2006)
Lecture Notes Comp. Sci.
, vol.3832
, pp. 640-646
-
-
Rodrigues, R.N.1
Yared, G.F.G.2
Costa, C.R.3
Yabu-Uti, J.B.T.4
Violaro, F.5
Ling, L.L.6
-
24
-
-
79951599175
-
Continuous verification using keystroke dynamics
-
Washington, DC
-
T. Shimshon, R. Moskovitch, L. Rokach, and Y. Elo,vici. "Continuous verification using keystroke dynamics. " Proc. Int. Conf. Comp. Intel. and Security. IEEE Computer Soc., Washington, DC, 411-415, 2010.
-
(2010)
Proc. Int. Conf. Comp. Intel. and Security. IEEE Computer Soc.
, pp. 411-415
-
-
Shimshon, T.1
Moskovitch, R.2
Rokach, L.3
Elo, Y.4
-
25
-
-
78650286294
-
A keystroke biometric system for long-text input
-
C. C. Tappert, S. Cha, M. Villani, & R. Zack, "A keystroke biometric system for long-text input," Int. J. Info. Sec. Privacy, 2010, pp. 32-60.
-
(2010)
Int. J. Info. Sec. Privacy
, pp. 32-60
-
-
Tappert, C.C.1
Cha, S.2
Villani, M.3
Zack, R.4
|