-
1
-
-
78650165017
-
User authentication through keystroke dynamics
-
Nov.
-
F. Bergadano, D. Gunetti, and C. Picardi, "User authentication through keystroke dynamics," ACM Trans. Inform. Syst. Security, vol. 5, no. 4, pp. 367-397, Nov. 2002.
-
(2002)
ACM Trans. Inform. Syst. Security
, vol.5
, Issue.4
, pp. 367-397
-
-
Bergadano, F.1
Gunetti, D.2
Picardi, C.3
-
2
-
-
0039921279
-
User identification via keystroke characteristics of typed names using neural networks
-
Dec.
-
M. Brown and S. J. Rogers, "User identification via keystroke characteristics of typed names using neural networks," Int. J. Man-Mach. Stud., vol. 39, no. 6, pp. 999-1014, Dec. 1993.
-
(1993)
Int. J. Man-Mach. Stud.
, vol.39
, Issue.6
, pp. 999-1014
-
-
Brown, M.1
Rogers, S.J.2
-
3
-
-
85104998275
-
Keystroke analysis as a method of advanced user authentication and response
-
May 7-9
-
P. Dowland, S. Furnell, and M. Papadaki, "Keystroke analysis as a method of advanced user authentication and response," in Proc. IFIP TC11 17th Int. Conf. Inform. Security: Visions Persp., May 7-9, 2002, pp. 215-226.
-
(2002)
Proc. IFIP TC11 17th Int. Conf. Inform. Security: Visions Persp.
, pp. 215-226
-
-
Dowland, P.1
Furnell, S.2
Papadaki, M.3
-
4
-
-
33745215614
-
Keystroke analysis of free text
-
DOI 10.1145/1085126.1085129
-
D. Gunetti and C. Picardi, "Keystroke analysis of free text," ACM Trans. Inform. Syst. Security, vol. 8, no. 3, pp. 312-347, Aug. 2005. (Pubitemid 43906388)
-
(2005)
ACM Transactions on Information and System Security
, vol.8
, Issue.3
, pp. 312-347
-
-
Gunetti, D.1
Picardi, C.2
-
7
-
-
41349112195
-
Peirce's criterion for the elimination of suspect experimental data
-
Oct.
-
S. Ross, "Peirce's criterion for the elimination of suspect experimental data," J. Eng. Technol., vol. 20, no. 2, pp. 38-41, Oct. 2003.
-
(2003)
J. Eng. Technol.
, vol.20
, Issue.2
, pp. 38-41
-
-
Ross, S.1
-
8
-
-
33845529124
-
Keystroke biometric recognition studies on long-text input under ideal and application-oriented conditions
-
June
-
M. Villani, C. Tappert, N. Giang, J. Simone, St. H. Fort, and S.-H. Cha, "Keystroke biometric recognition studies on long-text input under ideal and application-oriented conditions," in Proc. 2006 Conf. Comput. Vis. Pattern Recognit. Workshop (CVPRW'06), June 2006, p. 39.
-
(2006)
Proc. 2006 Conf. Comput. Vis. Pattern Recognit. Workshop (CVPRW'06)
, pp. 39
-
-
Villani, M.1
Tappert, C.2
Giang, N.3
Simone, J.4
Fort, S.H.5
Cha, S.-H.6
-
9
-
-
35148815257
-
Forgery quality and its implications for behavioral biometric security
-
DOI 10.1109/TSMCB.2007.903539, Special Issue on Recent Advances in Biometric Systems
-
L. Ballard, D. Lopresti, and F. Monrose, "Forgery quality and its implication for behavioral biometrics security," IEEE Trans. Syst. Man Cybernet., Part B, vol. 37, no. 5, pp. 1107-1118, Oct. 2007. (Pubitemid 47534580)
-
(2007)
IEEE Transactions on Systems, Man, and Cybernetics, Part B: Cybernetics
, vol.37
, Issue.5
, pp. 1107-1118
-
-
Ballard, L.1
Lopresti, D.2
Monrose, F.3
-
10
-
-
0031121887
-
Verification of computer users using keystroke dynamics
-
PII S1083441997001520
-
M. S. Obaidat and B. Sadoun, "Verification of computer users using keystroke dynamics," IEEE Trans. Syst., Man Cybernet., Part B, vol. 27, no. 2, pp. 261-269, 1997. (Pubitemid 127770659)
-
(1997)
IEEE Transactions on Systems, Man, and Cybernetics, Part B: Cybernetics
, vol.27
, Issue.2
, pp. 261-269
-
-
Obaidat, M.S.1
Sadoun, B.2
-
11
-
-
80051791613
-
Unconstrained keystroke dynamics authentication with shared secret
-
June
-
R. Giot, M. El-Abed, B. Hemery, and C. Rosenberger, "Unconstrained keystroke dynamics authentication with shared secret," Comput. Security, vol. 30, no. 6-7, pp. 427-445, June 2011.
-
(2011)
Comput. Security
, vol.30
, Issue.6-7
, pp. 427-445
-
-
Giot, R.1
El-Abed, M.2
Hemery, B.3
Rosenberger, C.4
-
14
-
-
0002232310
-
Technical testing and evaluation of biometric devices
-
A. K. Jain, R. Bolle, and S. Pankanti, Eds., Kluwer Academic Publishers
-
J. Wayman, "Technical testing and evaluation of biometric devices," in Biometrics: Personal Identification in Networked Society, A. K. Jain, R. Bolle, and S. Pankanti, Eds., Kluwer Academic Publishers, 1999.
-
(1999)
Biometrics: Personal Identification in Networked Society
-
-
Wayman, J.1
|