-
1
-
-
84928556255
-
Bringing strong authentication and transaction security to the realm of mobile devices
-
D. A. Ortiz-Yepes, R. J. Hermann, H. Steinauer, and P. Buhler, "Bringing strong authentication and transaction security to the realm of mobile devices", IBM Journal of Research and Development, vol. 58, no. 1, pp. 1-11, 2014.
-
(2014)
IBM Journal of Research and Development
, vol.58
, Issue.1
, pp. 1-11
-
-
Ortiz-Yepes, D.A.1
Hermann, R.J.2
Steinauer, H.3
Buhler, P.4
-
2
-
-
84859881694
-
Mobile one-time passwords: Two-factor authentication using mobile phones
-
M. H. Eldefrawy, M. K. Khan, K. Alghathbar, T. Kim, and H. Elkamchouchi, "Mobile one-time passwords: two-factor authentication using mobile phones", Security and Communication Networks, vol. 5, no. 5, pp. 508-516, 2012.
-
(2012)
Security and Communication Networks
, vol.5
, Issue.5
, pp. 508-516
-
-
Eldefrawy, M.H.1
Khan, M.K.2
Alghathbar, K.3
Kim, T.4
Elkamchouchi, H.5
-
3
-
-
84856033479
-
The state of phishing attacks
-
J. Hong, "The state of phishing attacks", Communications of the ACM, vol. 55, no. 1, pp. 74-81, 2012.
-
(2012)
Communications of the ACM
, vol.55
, Issue.1
, pp. 74-81
-
-
Hong, J.1
-
4
-
-
84903997169
-
Phishing attacks and countermeasures
-
Springer, Berlin, Germany
-
Z. Ramzan, "Phishing attacks and countermeasures", in Handbook of Information and Communication Security, no. 23, pp. 433-448, Springer, Berlin, Germany, 2010.
-
(2010)
Handbook of Information and Communication Security
, Issue.23
, pp. 433-448
-
-
Ramzan, Z.1
-
5
-
-
34848911641
-
Social phishing
-
T. N. Jagatic, N. A. Johnson, M. Jakobsson, and F. Menczer, "Social phishing", Communications of the ACM, vol. 50, no. 10, pp. 94-100, 2007.
-
(2007)
Communications of the ACM
, vol.50
, Issue.10
, pp. 94-100
-
-
Jagatic, T.N.1
Johnson, N.A.2
Jakobsson, M.3
Menczer, F.4
-
6
-
-
18144370814
-
Instant messaging: A new target for hackers
-
N. Leavitt, "Instant messaging: a new target for hackers", Computer, vol. 38, no. 7, pp. 20-23, 2005.
-
(2005)
Computer
, vol.38
, Issue.7
, pp. 20-23
-
-
Leavitt, N.1
-
7
-
-
27944453452
-
Phishing in the system of systems settings: Mobile technology
-
October
-
A. Van Der Merwe, R. Seker, and A. Gerber, "Phishing in the system of systems settings: mobile technology", in Proceedings of the IEEE International Conference on Systems, Man and Cybernetics, vol. 1, pp. 492-498, October 2005.
-
(2005)
Proceedings of the IEEE International Conference on Systems, Man and Cybernetics
, vol.1
, pp. 492-498
-
-
Van Der Merwe, A.1
Seker, R.2
Gerber, A.3
-
8
-
-
80052203154
-
Robust pose invariant shape-based hand recognition
-
Beijing, China, June
-
A. El-Sallam, F. Sohel, and M. Bennamoun, "Robust pose invariant shape-based hand recognition", in Proceeding of the 6th IEEE Conference on Industrial Electronics and Applications (ICIEA'11), pp. 281-286, Beijing, China, June 2011.
-
(2011)
Proceeding of the 6th IEEE Conference on Industrial Electronics and Applications (ICIEA'11)
, pp. 281-286
-
-
El-Sallam, A.1
Sohel, F.2
Bennamoun, M.3
-
9
-
-
84934971939
-
Biometric recognition systems: A survey
-
A. Heydarzadegan, M. Moradi, and A. Toorani, "Biometric recognition systems: a survey", International Research Journal of Applied and Basic Science, vol. 6, no. 11, pp. 1609-1618, 2013.
-
(2013)
International Research Journal of Applied and Basic Science
, vol.6
, Issue.11
, pp. 1609-1618
-
-
Heydarzadegan, A.1
Moradi, M.2
Toorani, A.3
-
10
-
-
70449640064
-
Privacy weaknesses in biometric sketches
-
May
-
K. Simoens, P. Tuyls, and B. Preneel, "Privacy weaknesses in biometric sketches", in Proceedings of the 30th IEEE Symposium on Security and Privacy, pp. 188-203, May 2009.
-
(2009)
Proceedings of the 30th IEEE Symposium on Security and Privacy
, pp. 188-203
-
-
Simoens, K.1
Tuyls, P.2
Preneel, B.3
-
11
-
-
84882991772
-
Adaptive cross-device gait recognition using a mobile accelerometer
-
T. Hoang, T. Nguyen, C. Luong, S. Do, and D. Choi, "Adaptive cross-device gait recognition using a mobile accelerometer", Journal of Information Processing Systems, vol. 9, no. 2, pp. 333-348, 2013.
-
(2013)
Journal of Information Processing Systems
, vol.9
, Issue.2
, pp. 333-348
-
-
Hoang, T.1
Nguyen, T.2
Luong, C.3
Do, S.4
Choi, D.5
-
12
-
-
84872106111
-
Biometric authentication on amobile device: A study of user effort, error and task disruption
-
December
-
S. Trewin, C. Swart, L. Koved, J. Martino, K. Singh, and S. Ben-David, "Biometric authentication on amobile device: a study of user effort, error and task disruption", in Proceedings of the 28th Annual Computer Security Applications Conference (ACSAC'12), pp. 159-168, December 2012.
-
(2012)
Proceedings of the 28th Annual Computer Security Applications Conference (ACSAC'12)
, pp. 159-168
-
-
Trewin, S.1
Swart, C.2
Koved, L.3
Martino, J.4
Singh, K.5
Ben-David, S.6
-
13
-
-
80052770388
-
Biometric recognition using online uppercase handwritten text
-
E. Sesa-Nogueras and M. Faundez-Zanuy, "Biometric recognition using online uppercase handwritten text", Pattern Recognition, vol. 45, no. 1, pp. 128-144, 2012.
-
(2012)
Pattern Recognition
, vol.45
, Issue.1
, pp. 128-144
-
-
Sesa-Nogueras, E.1
Faundez-Zanuy, M.2
-
14
-
-
77956588684
-
Accuracy improvement of speaker authentication in noisy environments using boneconducted speech
-
Seattle, Wash, USA, August
-
N. Yamasaki and T. Shimamura, "Accuracy improvement of speaker authentication in noisy environments using boneconducted speech", in Proceedings of the 53rd IEEE International Midwest Symposium on Circuits and Systems (MWSCAS'10), pp. 197-200, Seattle, Wash, USA, August 2010.
-
(2010)
Proceedings of the 53rd IEEE International Midwest Symposium on Circuits and Systems (MWSCAS'10)
, pp. 197-200
-
-
Yamasaki, N.1
Shimamura, T.2
-
15
-
-
84881530400
-
Biometric authentication and identification using keystroke dynamics: A survey
-
S. P. Banerjee and D. Woodard, "Biometric authentication and identification using keystroke dynamics: a survey", Journal of Pattern Recognition Research, vol. 7, no. 1, pp. 116-139, 2012.
-
(2012)
Journal of Pattern Recognition Research
, vol.7
, Issue.1
, pp. 116-139
-
-
Banerjee, S.P.1
Woodard, D.2
-
16
-
-
78650154214
-
A survey of biometric keystroke dynamics: Approaches, security and challenges
-
D. Shanmugapriya and G. Padmavathi, "A survey of biometric keystroke dynamics: approaches, security and challenges", International Journal of Computer Science and Information Security, vol. 5, no. 1, pp. 115-119, 2009.
-
(2009)
International Journal of Computer Science and Information Security
, vol.5
, Issue.1
, pp. 115-119
-
-
Shanmugapriya, D.1
Padmavathi, G.2
-
17
-
-
84890046120
-
Trusted M-banking verification scheme based on a combination of OTP and Biometrics
-
C.-L. Tsai, C.-J. Chen, and D.-J. Zhuang, "Trusted M-banking verification scheme based on a combination of OTP and Biometrics", Journal of Convergence, vol. 3, no. 3, pp. 23-30, 2012.
-
(2012)
Journal of Convergence
, vol.3
, Issue.3
, pp. 23-30
-
-
Tsai, C.-L.1
Chen, C.-J.2
Zhuang, D.-J.3
-
18
-
-
84907253627
-
Full privacy minutiae-based fingerprint verification for low-computation devices
-
C.-I. Fan and Y.-H. Lin, "Full privacy minutiae-based fingerprint verification for low-computation devices", Journal of Convergence, vol. 3, no. 2, pp. 21-24, 2012.
-
(2012)
Journal of Convergence
, vol.3
, Issue.2
, pp. 21-24
-
-
Fan, C.-I.1
Lin, Y.-H.2
-
19
-
-
79956343141
-
Accuracy and reliability of forensic latent fingerprint decisions
-
B. T. Ulery, R. A. Hicklin, J. Buscaglia, and M. A. Roberts, "Accuracy and reliability of forensic latent fingerprint decisions", Proceedings of the National Academy of Sciences of the United States of America, vol. 108, no. 19, pp. 7733-7738, 2011.
-
(2011)
Proceedings of the National Academy of Sciences of the United States of America
, vol.108
, Issue.19
, pp. 7733-7738
-
-
Ulery, B.T.1
Hicklin, R.A.2
Buscaglia, J.3
Roberts, M.A.4
-
20
-
-
62749088939
-
A survey of palmprint recognition
-
A. Kong, D. Zhang, and M. Kamel, "A survey of palmprint recognition", Pattern Recognition, vol. 42, no. 7, pp. 1408-1418, 2009.
-
(2009)
Pattern Recognition
, vol.42
, Issue.7
, pp. 1408-1418
-
-
Kong, A.1
Zhang, D.2
Kamel, M.3
-
21
-
-
84874203957
-
Face recognition based on PCA on wavelet subband of average-half-face
-
M. P. Satone and G. K. Kharate, "Face recognition based on PCA on wavelet subband of average-half-face", Journal of Information Processing Systems, vol. 8, no. 3, pp. 483-494, 2012.
-
(2012)
Journal of Information Processing Systems
, vol.8
, Issue.3
, pp. 483-494
-
-
Satone, M.P.1
Kharate, G.K.2
-
22
-
-
84907149460
-
Occluded and low resolution face detection with hierarchical deformable model
-
X. Yang, G. Peng, Z. Cai, and K. Zeng, "Occluded and low resolution face detection with hierarchical deformable model", Journal of Convergence, vol. 4, no. 2, pp. 11-14, 2013.
-
(2013)
Journal of Convergence
, vol.4
, Issue.2
, pp. 11-14
-
-
Yang, X.1
Peng, G.2
Cai, Z.3
Zeng, K.4
-
23
-
-
84874141791
-
Iris recognition using ridgelets
-
L. Birgale and M. Kokare, "Iris recognition using ridgelets", Journal of Information Processing Systems, vol. 8, no. 3, pp. 445-458, 2012.
-
(2012)
Journal of Information Processing Systems
, vol.8
, Issue.3
, pp. 445-458
-
-
Birgale, L.1
Kokare, M.2
-
24
-
-
84893274074
-
Biometric security application for person authentication using retinal vessel feature
-
Tasmania, Australia, November
-
A. Hussain, A. Bhuiyan, and A. Mian, "Biometric security application for person authentication using retinal vessel feature", in Proceedings of the International Conference on Digital Image Computing: Techniques and Application (DICTA'13), pp. 1-8, Tasmania, Australia, November 2013.
-
(2013)
Proceedings of the International Conference on Digital Image Computing: Techniques and Application (DICTA'13)
, pp. 1-8
-
-
Hussain, A.1
Bhuiyan, A.2
Mian, A.3
-
25
-
-
67649655765
-
A survey of biometric technology based on hand shape
-
N. Duta, "A survey of biometric technology based on hand shape", Pattern Recognition, vol. 42, no. 11, pp. 2797-2806, 2009.
-
(2009)
Pattern Recognition
, vol.42
, Issue.11
, pp. 2797-2806
-
-
Duta, N.1
-
26
-
-
82155168606
-
Unconstrained and contactless hand geometry biometrics
-
A. De-Santos-Sierra, C. Sánchez-Ávila, G. B. Del Pozo, and J. Guerra-Casanova, "Unconstrained and contactless hand geometry biometrics", Sensors, vol. 11, no. 11, pp. 10143-10164, 2011.
-
(2011)
Sensors
, vol.11
, Issue.11
, pp. 10143-10164
-
-
De-Santos-Sierra, A.1
Sánchez-Ávila, C.2
Del Pozo, G.B.3
Guerra-Casanova, J.4
-
27
-
-
70449564558
-
Combining 2D and 3D hand geometry features for biometrie verification
-
June
-
V. Kanhangad, A. Kumar, and D. Zhang, "Combining 2D and 3D hand geometry features for biometrie verification", in Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition (CVPR'09), pp. 39-44, June 2009.
-
(2009)
Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition (CVPR'09)
, pp. 39-44
-
-
Kanhangad, V.1
Kumar, A.2
Zhang, D.3
-
28
-
-
78650149575
-
HandsDown: Hand-contour-based user identification for interactive surfaces
-
October
-
D. Schmidt, M. K. Chong, and H. Gellersen, "HandsDown: hand-contour-based user identification for interactive surfaces", in Proceedings of the 6th Nordic Conference on Human-Computer Interaction: Extending Boundaries (NordiCHI'10), pp. 432-441, October 2010.
-
(2010)
Proceedings of the 6th Nordic Conference on Human-computer Interaction: Extending Boundaries (NordiCHI'10)
, pp. 432-441
-
-
Schmidt, D.1
Chong, M.K.2
Gellersen, H.3
-
29
-
-
84885006760
-
Examining a large keystroke biometrics dataset for statistical-attack openings
-
A. Serwadda and V. V. Phoha, "Examining a large keystroke biometrics dataset for statistical-attack openings", ACM Transactions on Information and SystemSecurity (TISSEC), vol. 16, no. 2, Article 8, 2013.
-
(2013)
ACM Transactions on Information and SystemSecurity (TISSEC)
, vol.16
, Issue.2
-
-
Serwadda, A.1
Phoha, V.V.2
-
30
-
-
84876789265
-
Biometric authentication using mouse gesture dynamics
-
B. Sayed, I. Traore, I. Woungang, and M. S. Obaidat, "Biometric authentication using mouse gesture dynamics", IEEE Systems Journal, vol. 7, no. 2, pp. 262-274, 2013.
-
(2013)
IEEE Systems Journal
, vol.7
, Issue.2
, pp. 262-274
-
-
Sayed, B.1
Traore, I.2
Woungang, I.3
Obaidat, M.S.4
-
31
-
-
84901199405
-
Active authentication formobile devices utilising behaviour profiling
-
F. Li, N. Clarke, M. Papadaki, and P. Dowland, "Active authentication formobile devices utilising behaviour profiling", International Journal of Information Security, vol. 13, no. 3, pp. 229-244, 2014.
-
(2014)
International Journal of Information Security
, vol.13
, Issue.3
, pp. 229-244
-
-
Li, F.1
Clarke, N.2
Papadaki, M.3
Dowland, P.4
-
32
-
-
33845701766
-
Authenticating mobile phone users using keystroke analysis
-
N. L. Clarke and S. M. Furnell, "Authenticating mobile phone users using keystroke analysis", International Journal of Information Security, vol. 6, no. 1, pp. 1-14, 2007.
-
(2007)
International Journal of Information Security
, vol.6
, Issue.1
, pp. 1-14
-
-
Clarke, N.L.1
Furnell, S.M.2
-
33
-
-
84899532170
-
Biometric gait recognition based on wireless acceleration sensor using k-nearest neighbor classification
-
S. Choi, I.-H. Youn, R. Le May, S. Burns, and J.-H. Youn, "Biometric gait recognition based on wireless acceleration sensor using k-nearest neighbor classification", in Proceedings of the International Conference on Computing, Networking and Communications, pp. 1091-1095, 2014.
-
(2014)
Proceedings of the International Conference on Computing, Networking and Communications
, pp. 1091-1095
-
-
Choi, S.1
Youn, I.-H.2
Le May, R.3
Burns, S.4
Youn, J.-H.5
-
34
-
-
35449001238
-
Feature fusion of side face and gait for video-based human identification
-
X. Zhou and B. Bhanu, "Feature fusion of side face and gait for video-based human identification", Pattern Recognition, vol. 41, no. 3, pp. 778-795, 2008.
-
(2008)
Pattern Recognition
, vol.41
, Issue.3
, pp. 778-795
-
-
Zhou, X.1
Bhanu, B.2
-
35
-
-
84890524654
-
Dynamic time warping for gesture-based user identification and authentication with kinect
-
J. Wu, J. Konrad, and P. Ishwar, "Dynamic time warping for gesture-based user identification and authentication with kinect", in Proceedings of the IEEE International Conference on Acoustics, Speech and Signal Processing, pp. 2371-2375, 2013.
-
(2013)
Proceedings of the IEEE International Conference on Acoustics, Speech and Signal Processing
, pp. 2371-2375
-
-
Wu, J.1
Konrad, J.2
Ishwar, P.3
-
36
-
-
84862081075
-
Biometricrichgestures: A novel approach toauthenti cationonmulti-touch devices
-
May
-
N. Sae-Bae, K. Ahmed, K. Isbister, and N. Memon, "Biometricrichgestures: a novel approach toauthenti cationonmulti-touch devices", in Proceedings of the 30th ACM Conference on Human Factors in Computing Systems (CHI'12), pp. 977-986, May 2012.
-
(2012)
Proceedings of the 30th ACM Conference on Human Factors in Computing Systems (CHI'12)
, pp. 977-986
-
-
Sae-Bae, N.1
Ahmed, K.2
Isbister, K.3
Memon, N.4
-
37
-
-
70449640064
-
Privacy weaknesses in biometric sketches
-
Berkeley, Calif, USA, May
-
K. Simoens, P. Tuyls, and B. Preneel, "Privacy weaknesses in biometric sketches", in Proceedings of the 30th IEEE Symposium on Security and Privacy, pp. 188-203, Berkeley, Calif, USA, May 2009.
-
(2009)
Proceedings of the 30th IEEE Symposium on Security and Privacy
, pp. 188-203
-
-
Simoens, K.1
Tuyls, P.2
Preneel, B.3
-
38
-
-
0742302036
-
Biometric recognition: Security and privacy concerns
-
S. Prabhakar, S. Pankanti, and A. K. Jain, "Biometric recognition: security and privacy concerns", IEEE Security and Privacy, vol. 1, no. 2, pp. 33-42, 2003.
-
(2003)
IEEE Security and Privacy
, vol.1
, Issue.2
, pp. 33-42
-
-
Prabhakar, S.1
Pankanti, S.2
Jain, A.K.3
-
39
-
-
84883119889
-
Efficient privacy-preserving biometric identification in cloud computing
-
Turin, Italy, April
-
J. Yuan and S. Yu, "Efficient privacy-preserving biometric identification in cloud computing", in Proceeding of the 32nd IEEE Conference on Computer Communications (INFOCOM'13), pp. 2652-2660, Turin, Italy, April 2013.
-
(2013)
Proceeding of the 32nd IEEE Conference on Computer Communications (INFOCOM'13)
, pp. 2652-2660
-
-
Yuan, J.1
Yu, S.2
-
40
-
-
84897140054
-
Design and analysis of a highly user-friendly, secure, privacy-preserving, and revocable authentication method
-
Y. Sui, X. Zou, E. Y. Du, and F. Li, "Design and analysis of a highly user-friendly, secure, privacy-preserving, and revocable authentication method", IEEE Transactions on Computers, vol. 63, no. 4, pp. 902-916, 2014.
-
(2014)
IEEE Transactions on Computers
, vol.63
, Issue.4
, pp. 902-916
-
-
Sui, Y.1
Zou, X.2
Du, E.Y.3
Li, F.4
-
41
-
-
33646401580
-
Implementation of hand geometry an analysis of user perspectives and system performance
-
E. Kukula and S. Elliott, "Implementation of hand geometry an analysis of user perspectives and system performance", IEEE Aerospace and Electronic Systems Magazine, vol. 21, no. 3, pp. 3-9, 2006.
-
(2006)
IEEE Aerospace and Electronic Systems Magazine
, vol.21
, Issue.3
, pp. 3-9
-
-
Kukula, E.1
Elliott, S.2
-
42
-
-
63649088610
-
Fake hands: Spoofing hand geometry systems
-
Arlington, Va, USA
-
H. Chen, H. Valizadegan, and C. Jackson, "Fake hands: spoofing hand geometry systems", in Biometrics Consortium Conference, Arlington, Va, USA, 2005.
-
(2005)
Biometrics Consortium Conference
-
-
Chen, H.1
Valizadegan, H.2
Jackson, C.3
-
43
-
-
34548074162
-
Protecting biometric templates with sketch: Theory and practice
-
Y. Sutcu, Q. Li, and N. Memon, "Protecting biometric templates with sketch: theory and practice", IEEE Transactions on Information Forensics and Security, vol. 2, no. 3, pp. 503-512, 2007.
-
(2007)
IEEE Transactions on Information Forensics and Security
, vol.2
, Issue.3
, pp. 503-512
-
-
Sutcu, Y.1
Li, Q.2
Memon, N.3
|