-
1
-
-
78650011800
-
The security of modern password expiration: an algorithmic framework and empirical analysis
-
CCS'10
-
Y. Zhang, F. Monrose, and M. K. Reiter, “The security of modern password expiration: an algorithmic framework and empirical analysis, ” in Proceedings of the 17th ACM conference on Computer and communications security, 2010, CCS'10, pp. 176-186.
-
(2010)
Proceedings of the 17th ACM conference on Computer and communications security
, pp. 176-186
-
-
Zhang, Y.1
Monrose, F.2
Reiter, M. K.3
-
2
-
-
33846307457
-
Graphical passwords: A survey
-
ACSAC'05
-
X. Suo, Y. Zhu, and G. S. Owen, “Graphical passwords: A survey, ” in Proceedings of the 21st Annual Computer Security Applications Conference, 2005, ACSAC'05, pp. 463-472.
-
(2005)
Proceedings of the 21st Annual Computer Security Applications Conference
, pp. 463-472
-
-
Suo, X.1
Zhu, Y.2
Owen, G. S.3
-
3
-
-
46449098913
-
User-controllable security and privacy for pervasive computing
-
Feb
-
J. Cornwell, I. Fette, G. Hsieh, M. Prabaker, J. Rao, K. Tang, K. Vaniea, L. Bauer, L. Cranor, J. Hong, B. McLaren, M. Reiter, and N. Sadeh, “User-controllable security and privacy for pervasive computing, ” in IEEE Workshop on Mobile Computing Systems and Applications (HotMobile), Feb 2007, pp. 14-19.
-
(2007)
IEEE Workshop on Mobile Computing Systems and Applications (HotMobile)
, pp. 14-19
-
-
Cornwell, J.1
Fette, I.2
Hsieh, G.3
Prabaker, M.4
Rao, J.5
Tang, K.6
Vaniea, K.7
Bauer, L.8
Cranor, L.9
Hong, J.10
McLaren, B.11
Reiter, M.12
Sadeh, N.13
-
5
-
-
34250782167
-
A comparison of perceived and real shoulder-surfing risks between alphanumeric and graphical passwords
-
SOUPS'06
-
F. Tari, A. A. Ozok, and S. H. Holden, “A comparison of perceived and real shoulder-surfing risks between alphanumeric and graphical passwords, ” in Proceedings of the second symposium on Usable privacy and security, 2006, SOUPS'06, pp. 56-66.
-
(2006)
Proceedings of the second symposium on Usable privacy and security
, pp. 56-66
-
-
Tari, F.1
Ozok, A. A.2
Holden, S. H.3
-
6
-
-
85180415196
-
-
“Kinect, ” http://www.xbox.com/en-US/KINECT.
-
Kinect
-
-
-
7
-
-
77956037275
-
Surface roughness vision measurement in different ambient light conditions
-
2/3, Aug
-
Z. Zhang, Chen Z, J. Shi, F. Jia, and M. Dai, “Surface roughness vision measurement in different ambient light conditions, ” Int. J. Comput. Appl. Technol., vol. 39, no. 1/2/3, pp. 53-57, Aug. 2010.
-
(2010)
Int. J. Comput. Appl. Technol
, vol.39
, Issue.1
, pp. 53-57
-
-
Zhang, Z.1
Chen, Z2
Shi, J.3
Jia, F.4
Dai, M.5
-
8
-
-
84856663879
-
Accuracy analysis of kinect depth data
-
K. Khoshelham, “Accuracy analysis of kinect depth data, ” GeoInformation Science, vol. 38, no. 5/W12, pp. 1, 2010.
-
(2010)
GeoInformation Science
, vol.38
, Issue.5/W12
, pp. 1
-
-
Khoshelham, K.1
-
10
-
-
34247167942
-
Design and evaluation of a shoulder-surfing resistant graphical password scheme
-
AVI'06
-
S. Wiedenbeck, J. Waters, L. Sobrado, and J-C. Birget, “Design and evaluation of a shoulder-surfing resistant graphical password scheme, ” in Proceedings of the working conference on Advanced visual interfaces, 2006, AVI'06, pp. 177-184.
-
(2006)
Proceedings of the working conference on Advanced visual interfaces
, pp. 177-184
-
-
Wiedenbeck, S.1
Waters, J.2
Sobrado, L.3
Birget, J-C.4
-
11
-
-
77953971010
-
Shoulder-surfing resistance with eye-gaze entry in cued-recall graphical passwords
-
CHI'10
-
A. Forget, S. Chiasson, and R. Biddle, “Shoulder-surfing resistance with eye-gaze entry in cued-recall graphical passwords, ” in Proceedings of the 28th international conference on Human factors in computing systems, 2010, CHI'10, pp. 1107-1110.
-
(2010)
Proceedings of the 28th international conference on Human factors in computing systems
, pp. 1107-1110
-
-
Forget, A.1
Chiasson, S.2
Biddle, R.3
-
12
-
-
1642363033
-
Taking a graphical approach to the password
-
L. D. Paulson, “Taking a graphical approach to the password, ” Computer, vol. 35, 2002.
-
(2002)
Computer
, vol.35
-
-
Paulson, L. D.1
-
13
-
-
0034809453
-
Enhancing security and privacy in biometrics-based authentication systems
-
N. K. Ratha, J. H. Connell, and R. M. Bolle, “Enhancing security and privacy in biometrics-based authentication systems, ” IBM Syst. J., vol. 40, no. 3, pp. 614-634, 2001.
-
(2001)
IBM Syst. J
, vol.40
, Issue.3
, pp. 614-634
-
-
Ratha, N. K.1
Connell, J. H.2
Bolle, R. M.3
-
14
-
-
60349131555
-
A bioinformatics based approach to user authentication via keystroke dynamics
-
K. Revett, “A bioinformatics based approach to user authentication via keystroke dynamics, ” International Journal of Control, Automation and Systems, vol. 7, no. 1, pp. 7-15, 2009.
-
(2009)
International Journal of Control, Automation and Systems
, vol.7
, Issue.1
, pp. 7-15
-
-
Revett, K.1
-
15
-
-
0033281372
-
Password hardening based on keystroke dynamics
-
CCS'99
-
F. Monrose, M. K. Reiter, and S. Wetzel, “Password hardening based on keystroke dynamics, ” in Proceedings of the 6th ACM conference on Computer and communications security, 1999, CCS'99, pp. 73-82.
-
(1999)
Proceedings of the 6th ACM conference on Computer and communications security
, pp. 73-82
-
-
Monrose, F.1
Reiter, M. K.2
Wetzel, S.3
-
16
-
-
80755187823
-
An efficient user verification system via mouse movements
-
CCS'11
-
N. Zheng, A. Paloski, and H. Wang, “An efficient user verification system via mouse movements, ” in Proceedings of the 18th ACM conference on Computer and communications security, 2011, CCS'11, pp. 139-150.
-
(2011)
Proceedings of the 18th ACM conference on Computer and communications security
, pp. 139-150
-
-
Zheng, N.1
Paloski, A.2
Wang, H.3
-
17
-
-
34547965365
-
A new biometric technology based on mouse dynamics
-
A. A. E. Ahmed and I. Traore, “A new biometric technology based on mouse dynamics, ” IEEE Transaction on Dependable and Security Computing, vol. 4, no. 3, pp. 165-179, 2007.
-
(2007)
IEEE Transaction on Dependable and Security Computing
, vol.4
, Issue.3
, pp. 165-179
-
-
Ahmed, A. A. E.1
Traore, I.2
-
18
-
-
85084161999
-
The design and analysis of graphical passwords
-
Aug. of SSYM'99
-
I. Jermyn, A. Mayer, F. Monrose, M. K. Reiter, and A. D. Rubin, “The design and analysis of graphical passwords, ” in Proceedings of the 8th conference on USENIX Security Symposium, Aug. 1999, vol. 8 of SSYM'99, pp. 1-14.
-
(1999)
Proceedings of the 8th conference on USENIX Security Symposium
, vol.8
, pp. 1-14
-
-
Jermyn, I.1
Mayer, A.2
Monrose, F.3
Reiter, M. K.4
Rubin, A. D.5
-
19
-
-
33947384964
-
Local and global feature selection for on-line signature verification
-
ICDAR'05
-
J. Richiardi, H. Ketabdar, and A. Drygajlo, “Local and global feature selection for on-line signature verification, ” in Proceedings of the 8th International Conference on Document Analysis and Recognition, 2005, ICDAR'05, pp. 625-629.
-
(2005)
Proceedings of the 8th International Conference on Document Analysis and Recognition
, pp. 625-629
-
-
Richiardi, J.1
Ketabdar, H.2
Drygajlo, A.3
-
20
-
-
26444498516
-
An on-line signature verification system based on fusion of local and global information
-
AVBPA'05
-
J. Fierrez-Aguilar, L. Nanni, J. Lopez-Pe nalba, J. Ortega-Garcia, and D. Maltoni, “An on-line signature verification system based on fusion of local and global information, ” in Proceedings of the 5th international conference on Audio- and Video-Based Biometric Person Authentication, 2005, AVBPA'05, pp. 523-532.
-
(2005)
Proceedings of the 5th international conference on Audio- and Video-Based Biometric Person Authentication
, pp. 523-532
-
-
Fierrez-Aguilar, J.1
Nanni, L.2
Lopez-Pe nalba, J.3
Ortega-Garcia, J.4
Maltoni, D.5
-
21
-
-
84958743179
-
Applications of support vector machines for pattern recognition: A survey
-
London, UK, SVM'02, Springer-Verlag
-
H. Byun and S-W. Lee, “Applications of support vector machines for pattern recognition: A survey, ” in Proceedings of the First International Workshop on Pattern Recognition with Support Vector Machines, London, UK, 2002, SVM'02, pp. 213-236, Springer-Verlag.
-
(2002)
Proceedings of the First International Workshop on Pattern Recognition with Support Vector Machines
, pp. 213-236
-
-
Byun, H.1
Lee, S-W.2
-
22
-
-
0003798635
-
-
Cambridge University Press, New York, NY, USA
-
N. Cristianini and J. Shawe-Taylor, An introduction to support Vector Machines: and other kernel-based learning methods, Cambridge University Press, New York, NY, USA, 2000.
-
(2000)
An introduction to support Vector Machines: and other kernel-based learning methods
-
-
Cristianini, N.1
Shawe-Taylor, J.2
-
23
-
-
0003413187
-
-
Prentice Hall PTR, Upper Saddle River, NJ, USA, 2nd edition
-
S. Haykin, Neural Networks: A Comprehensive Foundation, Prentice Hall PTR, Upper Saddle River, NJ, USA, 2nd edition, 1998.
-
(1998)
Neural Networks: A Comprehensive Foundation
-
-
Haykin, S.1
-
24
-
-
35148827336
-
Hmm-based on-line signature verification: Feature extraction and signature modeling
-
J. Fierrez, J. Ortega-Garcia, D. Ramos, and J. Gonzalez-Rodriguez, “Hmm-based on-line signature verification: Feature extraction and signature modeling, ” Pattern Recognition Letters, vol. 28, pp. 2325-2334, 2007.
-
(2007)
Pattern Recognition Letters
, vol.28
, pp. 2325-2334
-
-
Fierrez, J.1
Ortega-Garcia, J.2
Ramos, D.3
Gonzalez-Rodriguez, J.4
-
26
-
-
0036887670
-
On-line signature verification
-
Dec
-
A. Jain, “On-line signature verification, ” Pattern Recognition, vol. 35, no. 12, pp. 2963-2972, Dec. 2002.
-
(2002)
Pattern Recognition
, vol.35
, Issue.12
, pp. 2963-2972
-
-
Jain, A.1
-
27
-
-
25844484205
-
Identity authentication using improved online signature verification method
-
Nov
-
A. Kholmatov and B. Yanikoglu, “Identity authentication using improved online signature verification method, ” Pattern Recognition Letters, vol. 26, no. 15, pp. 2400-2408, Nov. 2005.
-
(2005)
Pattern Recognition Letters
, vol.26
, Issue.15
, pp. 2400-2408
-
-
Kholmatov, A.1
Yanikoglu, B.2
-
28
-
-
0010711709
-
On-line signature verification using pen-position, pen-pressure and pen-inclination trajectories
-
T. Ohishi, Y. Komiya, and T. Matsumoto, “On-line signature verification using pen-position, pen-pressure and pen-inclination trajectories, ” in Proceedings of the International Conference on Pattern Recognition, 2000, vol. 4, pp. 547-550.
-
(2000)
Proceedings of the International Conference on Pattern Recognition
, vol.4
, pp. 547-550
-
-
Ohishi, T.1
Komiya, Y.2
Matsumoto, T.3
-
29
-
-
65549143864
-
Online signature verification and recognition: An approach based on symbolic representation
-
D. S. Guru and H. N. Prakash, “Online signature verification and recognition: An approach based on symbolic representation, ” IEEE Transactions on Pattern Analysis and Machine Intelligence, vol. 31, pp. 1059-1073, 2009.
-
(2009)
IEEE Transactions on Pattern Analysis and Machine Intelligence
, vol.31
, pp. 1059-1073
-
-
Guru, D. S.1
Prakash, H. N.2
-
30
-
-
71249152432
-
Biometric person authentication method using camera-based online signature acquisition
-
ICDAR'09
-
D. Muramatsu, K.K. Yasuda, and T. Matsumoto, “Biometric person authentication method using camera-based online signature acquisition, ” in Proceedings of the 2009 10th International Conference on Document Analysis and Recognition, 2009, ICDAR'09, pp. 46-50.
-
(2009)
Proceedings of the 2009 10th International Conference on Document Analysis and Recognition
, pp. 46-50
-
-
Muramatsu, D.1
Yasuda, K.K.2
Matsumoto, T.3
-
32
-
-
45249087957
-
A study on biometric authentication based on arm sweep action with acceleration sensor
-
A. Kubota., Y. Hatori., K. Matsuo, M. Hashimoto, and A. Koike, “A study on biometric authentication based on arm sweep action with acceleration sensor, ” in Proceedings of International Symposium on Intelligent Signal Processing and Communication, 2006, pp. 219-222.
-
(2006)
Proceedings of International Symposium on Intelligent Signal Processing and Communication
, pp. 219-222
-
-
Kubota, A.1
Hatori, Y.2
Matsuo, K.3
Hashimoto, M.4
Koike, A.5
-
33
-
-
70450230583
-
User evaluation of lightweight user authentication with a single tri-axis accelerometer
-
MobileHCI'09
-
J. Liuand L. Zhong, J. Wickramasuriya, and V. Vasudevan, “User evaluation of lightweight user authentication with a single tri-axis accelerometer, ” in Proceedings of the 11th International Conference on Human-Computer Interaction with Mobile Devices and Services, 2009, MobileHCI'09, pp. 15:1-15:10.
-
(2009)
Proceedings of the 11th International Conference on Human-Computer Interaction with Mobile Devices and Services
, pp. 15:1-15:10
-
-
Liuand, J.1
Zhong, L.2
Wickramasuriya, J.3
Vasudevan, V.4
-
34
-
-
84871996285
-
Person authentication by handwriting in air using a biometric smart pen device
-
M. Bashir, G. Scharfenberg, and J. Kempf, “Person authentication by handwriting in air using a biometric smart pen device., ” BIOSIG, pp. 219-226, 2011.
-
(2011)
BIOSIG
, pp. 219-226
-
-
Bashir, M.1
Scharfenberg, G.2
Kempf, J.3
-
35
-
-
80054956286
-
Human detection using depth information by kinect
-
Colorado Springs, USA
-
L. Xia, C-C. Chen, and J. K. Aggarwal, “Human detection using depth information by kinect, ” in Workshop on Human Activity Understanding from 3D Data in conjunction with CVPR (HAU3D), Colorado Springs, USA, 2011.
-
(2011)
Workshop on Human Activity Understanding from 3D Data in conjunction with CVPR (HAU3D)
-
-
Xia, L.1
Chen, C-C.2
Aggarwal, J. K.3
-
36
-
-
38149119587
-
Cat motor: an innovative system to detect the behavior of human computer interaction for people with upper limb impairment
-
Berlin, Heidelberg, UAHCI'07, Springer-Verlag
-
C-C. Cko, M-C. Chen, T-F. Wu, S-Y. Chen, and CC. Yeh, “Cat motor: an innovative system to detect the behavior of human computer interaction for people with upper limb impairment, ” in Proceedings of the 4th international conference on Universal access in human-computer interaction: applications and services, Berlin, Heidelberg, 2007, UAHCI'07, pp. 242-250, Springer-Verlag.
-
(2007)
Proceedings of the 4th international conference on Universal access in human-computer interaction: applications and services
, pp. 242-250
-
-
Cko, C-C.1
Chen, M-C.2
Wu, T-F.3
Chen, S-Y.4
Yeh, CC.5
-
37
-
-
84856675314
-
Real-time sign language letter and word recognition from depth data
-
D. Uebersax, J. Gall, M. V. den Bergh, and L. V. Gool, “Real-time sign language letter and word recognition from depth data, ” in ICCV Workshops, 2011, pp. 383-390.
-
(2011)
ICCV Workshops
, pp. 383-390
-
-
Uebersax, D.1
Gall, J.2
den Bergh, M. V.3
Gool, L. V.4
-
39
-
-
83155190395
-
Tracking of fingertips and centers of palm using kinect
-
0
-
J. L. Raheja, A. Chaudhary, and K. Singal, “Tracking of fingertips and centers of palm using kinect, ” Computational Intelligence, Modelling and Simulation, International Conference on, vol. 0, pp. 248-252, 2011.
-
(2011)
Computational Intelligence, Modelling and Simulation, International Conference on
, pp. 248-252
-
-
Raheja, J. L.1
Chaudhary, A.2
Singal, K.3
-
40
-
-
84857612141
-
Accuracy and resolution of kinect depth data for indoor mapping applications
-
K. Khoshelham and S. O. Elberink, “Accuracy and resolution of kinect depth data for indoor mapping applications, ” Sensors, vol. 12, no. 2, pp. 1437-1454, 2012.
-
(2012)
Sensors
, vol.12
, Issue.2
, pp. 1437-1454
-
-
Khoshelham, K.1
Elberink, S. O.2
-
41
-
-
84859939262
-
Continuous recognition of one-handed and two-handed gestures using 3d full-body motion tracking sensors
-
New York, NY, USA, IUI'12, ACM
-
P. O. Kristensson, T. Nicholson, and A. Quigley, “Continuous recognition of one-handed and two-handed gestures using 3d full-body motion tracking sensors, ” in Proceedings of the 2012 ACM international conference on Intelligent User Interfaces, New York, NY, USA, 2012, IUI'12, pp. 89-92, ACM.
-
(2012)
Proceedings of the 2012 ACM international conference on Intelligent User Interfaces
, pp. 89-92
-
-
Kristensson, P. O.1
Nicholson, T.2
Quigley, A.3
-
43
-
-
0024861588
-
Automatic signature verification and writer identification - the state of the art
-
R. Plamondon and G. Lorette, “Automatic signature verification and writer identification - the state of the art, ” Pattern Recognition, vol. 22, no. 2, pp. 107-131, 1989.
-
(1989)
Pattern Recognition
, vol.22
, Issue.2
, pp. 107-131
-
-
Plamondon, R.1
Lorette, G.2
|