-
3
-
-
78650165017
-
User authentication through keystroke dynamics
-
F. Bergadano, D. Gunetti, and C. Picardi. User authentication through keystroke dynamics. ACM Transactions on Information and System Security (TISSEC), 5(4):367-397, 2002.
-
(2002)
ACM Transactions on Information and System Security (TISSEC)
, vol.5
, Issue.4
, pp. 367-397
-
-
Bergadano, F.1
Gunetti, D.2
Picardi, C.3
-
6
-
-
77953853641
-
Shake them up!: a movement-based pairing protocol for cpu-constrained devices
-
C. Castelluccia and P. Mutaf. Shake them up!: a movement-based pairing protocol for cpu-constrained devices. In MobiSys, pages 51-64, 2005.
-
(2005)
MobiSys
, pp. 51-64
-
-
Castelluccia, C.1
Mutaf, P.2
-
7
-
-
79955702502
-
LIBSVM: A library for support vector machines
-
27: Software
-
C.-C. Chang and C.-J. Lin. LIBSVM: A library for support vector machines. ACM Transactions on Intelligent Systems and Technology, 2:27:1-27:27, 2011. Software available at http://www.csie.ntu.edu.tw/cjlin/libsvm.
-
(2011)
ACM Transactions on Intelligent Systems and Technology
, vol.2
, pp. 1-27:27
-
-
Chang, C.-C.1
Lin, C.-J.2
-
9
-
-
79956003691
-
Mind how you answer me!: transparently authenticating the user of a smartphone when answering or placing a call
-
Hong Kong, China, ACM
-
M. Conti, I. Zachia-Zlatea, and B. Crispo. Mind how you answer me!: transparently authenticating the user of a smartphone when answering or placing a call. In Proceedings of ASIACCS2011, pages 249-259, Hong Kong, China, 2011. ACM.
-
(2011)
Proceedings of ASIACCS2011
, pp. 249-259
-
-
Conti, M.1
Zachia-Zlatea, I.2
Crispo, B.3
-
11
-
-
84862067265
-
Touch me once and i know it's you!: implicit authentication based on touch screen patterns
-
ACM
-
A. De Luca, A. Hang, F. Brudy, C. Lindner, and H. Hussmann. Touch me once and i know it's you!: implicit authentication based on touch screen patterns. In Proceedings of the 2012 ACM annual conference on Human Factors in Computing Systems, pages 987-996. ACM, 2012.
-
(2012)
Proceedings of the 2012 ACM annual conference on Human Factors in Computing Systems
, pp. 987-996
-
-
De Luca, A.1
Hang, A.2
Brudy, F.3
Lindner, C.4
Hussmann, H.5
-
12
-
-
0032673243
-
Face authentication with gabor information on deformable graphs
-
B. Duc, S. Fischer, and J. Bigun. Face authentication with gabor information on deformable graphs. IEEE Transactions on Image Processing, 8(4):504-516, 1999.
-
(1999)
IEEE Transactions on Image Processing
, vol.8
, Issue.4
, pp. 504-516
-
-
Duc, B.1
Fischer, S.2
Bigun, J.3
-
13
-
-
8844279221
-
A behavioral biometric system based on human-computer interaction
-
H. Gamboa and A. Fred. A behavioral biometric system based on human-computer interaction. In Proceedings of SPIE, volume 5404, pages 381-392, 2004.
-
(2004)
Proceedings of SPIE
, vol.5404
, pp. 381-392
-
-
Gamboa, H.1
Fred, A.2
-
14
-
-
85180419433
-
-
Feb
-
Google Inc. Android developer guide. http://developer.android.com/guide/basics/whatis-android.html, Feb 2012.
-
(2012)
Android developer guide
-
-
-
15
-
-
85180413188
-
-
Google Inc. Feb
-
Google Inc. Android sensor manager, http://developer.android.com/reference/android/hardware/sensorma nager.html, Feb. 2012.
-
(2012)
Android sensor manager
-
-
-
18
-
-
79956040654
-
On mouse dynamics as a behavioral biometric for authentication
-
Hong Kong, China
-
Z. Jorgensen and T. Yu. On mouse dynamics as a behavioral biometric for authentication. In Proceedings of the ASIACCS2011, pages 476-482, Hong Kong, China, 2011.
-
(2011)
Proceedings of the ASIACCS2011
, pp. 476-482
-
-
Jorgensen, Z.1
Yu, T.2
-
19
-
-
85180414539
-
-
Lookout Inc. Mobile phone lost and found. https://www.lookout.com/resources/reports/mobilelost-and-found/billion-dollar-phone-bill, 2012.
-
(2012)
Mobile phone lost and found
-
-
-
20
-
-
33646811518
-
Identifying users of portable devices from gait pattern with accelerometers
-
pages IEEE
-
J. Mantyjarvi, M. Lindholm, E. Vildjiounaite, S. Makela, and H. Ailisto. Identifying users of portable devices from gait pattern with accelerometers. In Proceedings of ICASSP'05, volume 2, pages ii-973. IEEE, 2005.
-
(2005)
Proceedings of ICASSP'05
, vol.2
, pp. ii-973
-
-
Mantyjarvi, J.1
Lindholm, M.2
Vildjiounaite, E.3
Makela, S.4
Ailisto, H.5
-
21
-
-
65349086799
-
Shake well before use: Intuitive and secure pairing of mobile devices
-
R. Mayrhofer and H. Gellersen. Shake well before use: Intuitive and secure pairing of mobile devices. IEEE Trans. Mob. Comput., 8(6):792-806, 2009.
-
(2009)
IEEE Trans. Mob. Comput
, vol.8
, Issue.6
, pp. 792-806
-
-
Mayrhofer, R.1
Gellersen, H.2
-
22
-
-
0038628620
-
Password hardening based on keystroke dynamics
-
F. Monrose, M. Reiter, and S. Wetzel. Password hardening based on keystroke dynamics. International Journal of Information Security, 1(2):69-83, 2002.
-
(2002)
International Journal of Information Security
, vol.1
, Issue.2
, pp. 69-83
-
-
Monrose, F.1
Reiter, M.2
Wetzel, S.3
-
24
-
-
77958105748
-
Improving mouse dynamics biometric performance using variance reduction via extractors with separate features
-
Y. Nakkabi, I. Traoré, and A. Ahmed. Improving mouse dynamics biometric performance using variance reduction via extractors with separate features. IEEE Transactions on Systems, Man and Cybernetics, Part A: Systems and Humans, 40(6):1345-1353, 2010.
-
(2010)
IEEE Transactions on Systems, Man and Cybernetics, Part A: Systems and Humans
, vol.40
, Issue.6
, pp. 1345-1353
-
-
Nakkabi, Y.1
Traoré, I.2
Ahmed, A.3
-
25
-
-
45249087957
-
A study on biometric authentication based on arm sweep action with acceleration sensor
-
IEEE
-
F. Okumura, A. Kubota, Y. Hatori, K. Matsuo, M. Hashimoto, and A. Koike. A study on biometric authentication based on arm sweep action with acceleration sensor. In Proceedings of ISPACS'06, pages 219-222. IEEE, 2006.
-
(2006)
Proceedings of ISPACS'06
, pp. 219-222
-
-
Okumura, F.1
Kubota, A.2
Hatori, Y.3
Matsuo, K.4
Hashimoto, M.5
Koike, A.6
-
27
-
-
61849120700
-
User-specific iris authentication based on feature selection
-
pages IEEE
-
M. Qi, Y. Lu, J. Li, X. Li, and J. Kong. User-specific iris authentication based on feature selection. In Proceedings of ICCSSE 2008, volume 1, pages 1040-1043. IEEE, 2008.
-
(2008)
Proceedings of ICCSSE 2008
, vol.1
, pp. 1040-1043
-
-
Qi, M.1
Lu, Y.2
Li, J.3
Li, X.4
Kong, J.5
-
28
-
-
85180416088
-
-
H. Rydberg. Multi-touch protocol.. http://www.mjmwired.net/kernel/Documentation/input/multi-touch-protocol.txt, 2009.
-
(2009)
Multi-touch protocol
-
-
Rydberg, H.1
-
30
-
-
84861631303
-
Efficient anonymous message submission
-
Orlando, FL, USA, March IEEE
-
X. Zhao, L. Li, G. Xue, and G. Silva. Efficient anonymous message submission. In INFOCOM, 2012 Proceedings IEEE, pages 2228-2236, Orlando, FL, USA, March 2012. IEEE.
-
(2012)
INFOCOM, 2012 Proceedings IEEE
, pp. 2228-2236
-
-
Zhao, X.1
Li, L.2
Xue, G.3
Silva, G.4
-
31
-
-
80755187823
-
An efficient user verification system via mouse movements
-
ACM
-
N. Zheng, A. Paloski, and H. Wang. An efficient user verification system via mouse movements. In Proceedings of ACM CCS2012, pages 139-150. ACM, 2011.
-
(2011)
Proceedings of ACM CCS2012
, pp. 139-150
-
-
Zheng, N.1
Paloski, A.2
Wang, H.3
|