-
1
-
-
67650239548
-
Fake fingers in fingerprint recognition: Glycerin supersedes gelatin
-
Cortier, C. Kirchner, M. Okada, and H. Sakurada, Eds. Springer Berlin Heidelberg, [Online]. Available
-
C. Barral and A. Tria, “Fake fingers in fingerprint recognition: Glycerin supersedes gelatin,” in Formal to Practical Security, ser. Lecture Notes in Computer Science, V. Cortier, C. Kirchner, M. Okada, and H. Sakurada, Eds. Springer Berlin Heidelberg, 2009, vol. 5458, pp. 57–69. [Online]. Available: http://dx.doi.org/10.1007/978-3-642-02002-5_4
-
(2009)
Formal to Practical Security, ser. Lecture Notes in Computer Science
, vol.5458
, pp. 57-69
-
-
Barral, C.1
Tria, A.2
-
2
-
-
85059278483
-
-
(Feb) Last accessed 03.08.2013. [Online]. Available
-
V. Biometric. (2009, Feb.) How to make the fake fingerprints (by VIRDI). Last accessed 03.08.2013. [Online]. Available: http://www.youtube.com/watch?v=-H71tyMupqk
-
(2009)
How to make the fake fingerprints (by VIRDI)
-
-
Biometric, V.1
-
3
-
-
85180625963
-
Safe: Secure authentication with face and eyes
-
Jun
-
A. Boehm, D. Chen, M. Frank, D. Huang, C. Kuo, T. Lolic, I. Martinovic, and D. Song, “Safe: Secure authentication with face and eyes,” in In Proceedings of International Conference on Security and Privacy in Mobile Information and Communication Systems, Jun. 2013.
-
(2013)
Proceedings of International Conference on Security and Privacy in Mobile Information and Communication Systems
-
-
Boehm, A.1
Chen, D.2
Frank, M.3
Huang, D.4
Kuo, C.5
Lolic, T.6
Martinovic, I.7
Song, D.8
-
4
-
-
33847652928
-
Advanced user authentication for mobile devices
-
N. Clarke and S. Furnell, “Advanced user authentication for mobile devices,” Computers & Security, vol. 26, no. 2, pp. 109 – 119, 2007.
-
(2007)
Computers & Security
, vol.26
, Issue.2
, pp. 109-119
-
-
Clarke, N.1
Furnell, S.2
-
5
-
-
84897817695
-
Who wears me? bioimpedance as a passive biometric
-
August
-
C. Cornelius, J. Sorber, R. Peterson, J. Skinner, R. Halter, and D. Kotz, “Who wears me? bioimpedance as a passive biometric,” in Proceedings of the USENIX Workshop on Health Security and Privacy, August 2012.
-
(2012)
Proceedings of the USENIX Workshop on Health Security and Privacy
-
-
Cornelius, C.1
Sorber, J.2
Peterson, R.3
Skinner, J.4
Halter, R.5
Kotz, D.6
-
6
-
-
77951006536
-
-
N. S. T. Council, [Online]. Available
-
N. S. . T. Council, “Biometrics frequently asked questions,” 2006. [Online]. Available: http://biometrics.gov/Documents/FAQ.pdf
-
(2006)
Biometrics frequently asked questions
-
-
-
7
-
-
84872116385
-
Touchalytics: On the applicability of touchscreen input as a behavioral biometric for continuous authentication
-
1
-
M. Frank, R. Biedert, E. Ma, I. Martinovic, and D. Song, “Touchalytics: On the applicability of touchscreen input as a behavioral biometric for continuous authentication,” Information Forensics and Security, IEEE Transactions on, vol. 8, no. 1, pp. 136 –148, 1 2013.
-
(2013)
Information Forensics and Security, IEEE Transactions on
, vol.8
, Issue.1
, pp. 136-148
-
-
Frank, M.1
Biedert, R.2
Ma, E.3
Martinovic, I.4
Song, D.5
-
8
-
-
84908590695
-
From the iriscode to the iris: A new vulnerability of iris recognition systems
-
Feb. last accessed 03.08.2013. [Online]. Available
-
J. Galbally, A. Ross, M. Gomez-Barrero, J. Fierrez, and J. Ortega-Garcia, “From the iriscode to the iris: A new vulnerability of iris recognition systems,” in White paper for Black Hat USA 2012, Feb. 2012, last accessed 03.08.2013. [Online]. Available: https://media.blackhat.com/bh-us-12/Briefings/Galbally/BH_ US_12_Galbally_Iris_Reconstruction_WP.pdf
-
(2012)
White paper for Black Hat USA 2012
-
-
Galbally, J.1
Ross, A.2
Gomez-Barrero, M.3
Fierrez, J.4
Ortega-Garcia, J.5
-
9
-
-
8844279221
-
A behavioral biometric system based on human-computer interaction
-
H. Gamboa and A. Fred, “A behavioral biometric system based on human-computer interaction,” in Proc. SPIE 5404, 2004, p. 381.
-
(2004)
Proc. SPIE
, vol.5404
, pp. 381
-
-
Gamboa, H.1
Fred, A.2
-
11
-
-
84869074286
-
Capacitive fingerprinting: exploring user differentiation by sensing electrical properties of the human body
-
C. Harrison, M. Sato, and I. Poupyrev, “Capacitive fingerprinting: exploring user differentiation by sensing electrical properties of the human body,” in Proceedings of the 25th Annual ACM Symposium on User Interface Software and Technology (UIST’12), 2012, pp. 537–544.
-
(2012)
Proceedings of the 25th Annual ACM Symposium on User Interface Software and Technology (UIST’12)
, pp. 537-544
-
-
Harrison, C.1
Sato, M.2
Poupyrev, I.3
-
13
-
-
33744779400
-
Biometrics: a tool for information security
-
June
-
A. Jain, A. Ross, and S. Pankanti, “Biometrics: a tool for information security,” Information Forensics and Security, IEEE Transactions on, vol. 1, no. 2, pp. 125 – 143, June 2006.
-
(2006)
Information Forensics and Security, IEEE Transactions on
, vol.1
, Issue.2
, pp. 125-143
-
-
Jain, A.1
Ross, A.2
Pankanti, S.3
-
14
-
-
4544258314
-
-
ser. SpringerLink: Bücher. Springer, [Online]. Available
-
A. Jain, A. Ross, and K. Nandakumar, Introduction to Biometrics, ser. SpringerLink: Bücher. Springer, 2011. [Online]. Available: http://books.google.com/books?id=ZPt2xrZFtzkC
-
(2011)
Introduction to Biometrics
-
-
Jain, A.1
Ross, A.2
Nandakumar, K.3
-
15
-
-
79956040654
-
On mouse dynamics as a behavioral biometric for authentication
-
New York, NY, USA: ACM, [Online]. Available
-
Z. Jorgensen and T. Yu, “On mouse dynamics as a behavioral biometric for authentication,” in Proceedings of the 6th ACM Symposium on Information, Computer and Communications Security, ser. ASIACCS ’11. New York, NY, USA: ACM, 2011, pp. 476–482. [Online]. Available: http://doi.acm.org/10.1145/1966913.1966983
-
(2011)
Proceedings of the 6th ACM Symposium on Information, Computer and Communications Security, ser. ASIACCS ’11
, pp. 476-482
-
-
Jorgensen, Z.1
Yu, T.2
-
16
-
-
0025384135
-
Identity authentication based on keystroke latencies
-
Feb. [Online]. Available
-
R. Joyce and G. Gupta, “Identity authentication based on keystroke latencies,” Commun. ACM, vol. 33, no. 2, pp. 168–176, Feb. 1990. [Online]. Available: http://doi.acm.org/10.1145/75577.75582
-
(1990)
Commun. ACM
, vol.33
, Issue.2
, pp. 168-176
-
-
Joyce, R.1
Gupta, G.2
-
17
-
-
79952860877
-
-
J. Koreman, A. C. Morris, D. Wu, S. Jassim, H. Sellahewa, J. Ehlers, G. Chollet, G. Aversano, H. Bredin, S. Garcia-salicetti, L. Allano, B. L. Van, and B. Dorizzi, “Multi-modal biometric authentication on the SecurePhone PDA,” 2006.
-
(2006)
Multi-modal biometric authentication on the SecurePhone PDA
-
-
Koreman, J.1
Morris, A. C.2
Wu, D.3
Jassim, S.4
Sellahewa, H.5
Ehlers, J.6
Chollet, G.7
Aversano, G.8
Bredin, H.9
Garcia-salicetti, S.10
Allano, L.11
Van, B. L.12
Dorizzi, B.13
-
18
-
-
0033281372
-
Password hardening based on keystroke dynamics
-
New York, NY, USA: ACM, [Online]. Available
-
F. Monrose, M. K. Reiter, and S. Wetzel, “Password hardening based on keystroke dynamics,” in Proceedings of the 6th ACM conference on Computer and communications security, ser. CCS’99. New York, NY, USA: ACM, 1999, pp. 73–82. [Online]. Available: http://doi.acm.org/10.1145/319709.319720
-
(1999)
Proceedings of the 6th ACM conference on Computer and communications security, ser. CCS’99
, pp. 73-82
-
-
Monrose, F.1
Reiter, M. K.2
Wetzel, S.3
-
19
-
-
77958105748
-
Improving mouse dynamics biometric performance using variance reduction via extractors with separate features
-
Nov. [Online]. Available
-
Y. Nakkabi, I. Traoré, and A. A. E. Ahmed, “Improving mouse dynamics biometric performance using variance reduction via extractors with separate features,” Trans. Sys. Man Cyber. Part A, vol. 40, no. 6, pp. 1345–1353, Nov. 2010. [Online]. Available: http://dx.doi.org/10.1109/TSMCA.2010.2052602
-
(2010)
Trans. Sys. Man Cyber. Part A
, vol.40
, Issue.6
, pp. 1345-1353
-
-
Nakkabi, Y.1
Traoré, I.2
Ahmed, A. A. E.3
-
20
-
-
85059263154
-
-
[Online]. Available
-
L. Nara, “Hand electrodes brass (1 pair),” 2013. [Online]. Available: http://www.lyranara.com/hand-electrodes-brass-1-pair/
-
(2013)
Hand electrodes brass (1 pair)
-
-
Nara, L.1
-
22
-
-
85180636174
-
Your face is not your password: Face authentication bypassing - lenovo - asus - toshiba
-
Feb. last accessed 03.08.2013. [Online]. Available
-
M. D. Nguyen and Q. M. Bui, “Your face is not your password: Face authentication bypassing - lenovo - asus - toshiba,” in In briefings of 2009 Black Hat Conference, Feb. 2009, last accessed 03.08.2013. [Online]. Available: http://www.blackhat.com/presentations/bh-dc-09/Nguyen/BlackHat-DC-09-Nguyen-Face-not-your-password-slides.pdf
-
(2009)
briefings of 2009 Black Hat Conference
-
-
Nguyen, M. D.1
Bui, Q. M.2
-
23
-
-
78649425712
-
Continuous user authentication using temporal information
-
B. K. Kumar, S. Prabhakar, and A. A. Ross, Eds. SPIE
-
K. Niinuma and A. K. Jain, “Continuous user authentication using temporal information,” in Biometric Technology for Human Identification VII, B. V. K. V. Kumar, S. Prabhakar, and A. A. Ross, Eds., vol. 7667, no. 1. SPIE, 2010.
-
(2010)
Biometric Technology for Human Identification VII
, vol.7667
, Issue.1
-
-
Niinuma, K.1
Jain, A. K.2
-
24
-
-
0042585206
-
Keystroke dynamics based authentication
-
A. K. Jain, R. Bolle, and S. Pankanti, Eds. Springer US
-
M. S. Obaidat and B. Sadoun, “Keystroke dynamics based authentication,” in Biometrics, A. K. Jain, R. Bolle, and S. Pankanti, Eds. Springer US, 2002, pp. 213–229.
-
(2002)
Biometrics
, pp. 213-229
-
-
Obaidat, M. S.1
Sadoun, B.2
-
25
-
-
85010724737
-
-
I. T. L. N. I. of Standards and Technology, [Online]. Available
-
I. T. L. N. I. of Standards and Technology, “The biometrics resource center,” 2013. [Online]. Available: http://www.nist.gov/itl/csd/biometrics/index.cfm
-
(2013)
The biometrics resource center
-
-
-
26
-
-
20444496997
-
User re-authentication via mouse movements
-
New York, NY, USA: ACM, [Online]. Available
-
M. Pusara and C. E. Brodley, “User re-authentication via mouse movements,” in Proceedings of the 2004 ACM workshop on Visualization and data mining for computer security, ser. VizSEC/DMSEC’04. New York, NY, USA: ACM, 2004, pp. 1–8. [Online]. Available: http://doi.acm.org/10.1145/1029208.1029210
-
(2004)
Proceedings of the 2004 ACM workshop on Visualization and data mining for computer security, ser. VizSEC/DMSEC’04
, pp. 1-8
-
-
Pusara, M.1
Brodley, C. E.2
-
27
-
-
77956989600
-
Cognitive biometrics: Challenges for the future
-
K. Revett and S. T. Magalhes, “Cognitive biometrics: Challenges for the future,” in Global Security, Safety, and Sustainability, 2010, vol. 92, pp. 79–86.
-
(2010)
Global Security, Safety, and Sustainability
, vol.92
, pp. 79-86
-
-
Revett, K.1
Magalhes, S. T.2
-
29
-
-
12844256823
-
Keyboard apparatus for personal identification
-
R. Spillane, “Keyboard apparatus for personal identification,” IBM Technical Disclosure Bulletin, vol. 17, no. 3346, 1975.
-
(1975)
IBM Technical Disclosure Bulletin
, vol.17
, Issue.3346
-
-
Spillane, R.1
-
30
-
-
85010753240
-
-
Wikipedia, [Online]. Available
-
Wikipedia, “Sensitivity and specificity,” 2013. [Online]. Available: http://en.wikipedia.org/wiki/Sensitivity_and_specificity
-
(2013)
Sensitivity and specificity
-
-
-
31
-
-
8844265659
-
-
ser. RSA Press Series. McGraw-Hill/Osborne, [Online]. Available
-
J. Woodward, N. Orlans, and P. Higgins, Biometrics, ser. RSA Press Series. McGraw-Hill/Osborne, 2003. [Online]. Available: http://books.google.com/books?id=j-o_btaFK6wC
-
(2003)
Biometrics
-
-
Woodward, J.1
Orlans, N.2
Higgins, P.3
-
32
-
-
70350234989
-
Behavioural biometrics; a survey and classification
-
Jun. [Online]. Available
-
R. V. Yampolskiy and V. Govindaraju, “Behavioural biometrics; a survey and classification,” Int. J. Biometrics, vol. 1, no. 1, pp. 81–113, Jun. 2008. [Online]. Available: http://dx.doi.org/10.1504/IJBM.2008.018665
-
(2008)
Int. J. Biometrics
, vol.1
, Issue.1
, pp. 81-113
-
-
Yampolskiy, R. V.1
Govindaraju, V.2
-
33
-
-
80755187823
-
An efficient user verification system via mouse movements
-
New York, NY, USA: ACM, [Online]. Available
-
N. Zheng, A. Paloski, and H. Wang, “An efficient user verification system via mouse movements,” in Proceedings of the 18th ACM conference on Computer and communications security, ser. CCS’11. New York, NY, USA: ACM, 2011, pp. 139–150. [Online]. Available: http://doi.acm.org/10.1145/2046707.2046725
-
(2011)
Proceedings of the 18th ACM conference on Computer and communications security, ser. CCS’11
, pp. 139-150
-
-
Zheng, N.1
Paloski, A.2
Wang, H.3
|