메뉴 건너뛰기




Volumn , Issue , 2014, Pages

Authentication Using Pulse-Response Biometrics

Author keywords

[No Author keywords available]

Indexed keywords

AUTHENTICATION;

EID: 85180156819     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.14722/ndss/2014.23208     Document Type: Conference Paper
Times cited : (47)

References (33)
  • 1
    • 67650239548 scopus 로고    scopus 로고
    • Fake fingers in fingerprint recognition: Glycerin supersedes gelatin
    • Cortier, C. Kirchner, M. Okada, and H. Sakurada, Eds. Springer Berlin Heidelberg, [Online]. Available
    • C. Barral and A. Tria, “Fake fingers in fingerprint recognition: Glycerin supersedes gelatin,” in Formal to Practical Security, ser. Lecture Notes in Computer Science, V. Cortier, C. Kirchner, M. Okada, and H. Sakurada, Eds. Springer Berlin Heidelberg, 2009, vol. 5458, pp. 57–69. [Online]. Available: http://dx.doi.org/10.1007/978-3-642-02002-5_4
    • (2009) Formal to Practical Security, ser. Lecture Notes in Computer Science , vol.5458 , pp. 57-69
    • Barral, C.1    Tria, A.2
  • 2
    • 85059278483 scopus 로고    scopus 로고
    • (Feb) Last accessed 03.08.2013. [Online]. Available
    • V. Biometric. (2009, Feb.) How to make the fake fingerprints (by VIRDI). Last accessed 03.08.2013. [Online]. Available: http://www.youtube.com/watch?v=-H71tyMupqk
    • (2009) How to make the fake fingerprints (by VIRDI)
    • Biometric, V.1
  • 4
    • 33847652928 scopus 로고    scopus 로고
    • Advanced user authentication for mobile devices
    • N. Clarke and S. Furnell, “Advanced user authentication for mobile devices,” Computers & Security, vol. 26, no. 2, pp. 109 – 119, 2007.
    • (2007) Computers & Security , vol.26 , Issue.2 , pp. 109-119
    • Clarke, N.1    Furnell, S.2
  • 6
    • 77951006536 scopus 로고    scopus 로고
    • N. S. T. Council, [Online]. Available
    • N. S. . T. Council, “Biometrics frequently asked questions,” 2006. [Online]. Available: http://biometrics.gov/Documents/FAQ.pdf
    • (2006) Biometrics frequently asked questions
  • 7
    • 84872116385 scopus 로고    scopus 로고
    • Touchalytics: On the applicability of touchscreen input as a behavioral biometric for continuous authentication
    • 1
    • M. Frank, R. Biedert, E. Ma, I. Martinovic, and D. Song, “Touchalytics: On the applicability of touchscreen input as a behavioral biometric for continuous authentication,” Information Forensics and Security, IEEE Transactions on, vol. 8, no. 1, pp. 136 –148, 1 2013.
    • (2013) Information Forensics and Security, IEEE Transactions on , vol.8 , Issue.1 , pp. 136-148
    • Frank, M.1    Biedert, R.2    Ma, E.3    Martinovic, I.4    Song, D.5
  • 8
    • 84908590695 scopus 로고    scopus 로고
    • From the iriscode to the iris: A new vulnerability of iris recognition systems
    • Feb. last accessed 03.08.2013. [Online]. Available
    • J. Galbally, A. Ross, M. Gomez-Barrero, J. Fierrez, and J. Ortega-Garcia, “From the iriscode to the iris: A new vulnerability of iris recognition systems,” in White paper for Black Hat USA 2012, Feb. 2012, last accessed 03.08.2013. [Online]. Available: https://media.blackhat.com/bh-us-12/Briefings/Galbally/BH_ US_12_Galbally_Iris_Reconstruction_WP.pdf
    • (2012) White paper for Black Hat USA 2012
    • Galbally, J.1    Ross, A.2    Gomez-Barrero, M.3    Fierrez, J.4    Ortega-Garcia, J.5
  • 9
    • 8844279221 scopus 로고    scopus 로고
    • A behavioral biometric system based on human-computer interaction
    • H. Gamboa and A. Fred, “A behavioral biometric system based on human-computer interaction,” in Proc. SPIE 5404, 2004, p. 381.
    • (2004) Proc. SPIE , vol.5404 , pp. 381
    • Gamboa, H.1    Fred, A.2
  • 10
    • 84988969821 scopus 로고    scopus 로고
    • Fighting coercion attacks in key generation using skin conductance
    • [Online]. Available
    • P. Gupta and D. Gao, “Fighting coercion attacks in key generation using skin conductance,” in Proceedings of the 19th USENIX Conference on Security, ser. USENIX Security’10, 2010, pp. 30–30. [Online]. Available: http://dl.acm.org/citation.cfm?id=1929820.1929860
    • (2010) Proceedings of the 19th USENIX Conference on Security, ser. USENIX Security’10 , pp. 30-30
    • Gupta, P.1    Gao, D.2
  • 12
    • 85059276193 scopus 로고    scopus 로고
    • S. Inc., [Online]. Available
    • S. V. Inc., “Facial recognition provides continuous system security,” 2013. [Online]. Available: http://www.sensiblevision.com/en-us/fastaccessanywhere/overview.aspx
    • (2013) Facial recognition provides continuous system security
  • 14
    • 4544258314 scopus 로고    scopus 로고
    • ser. SpringerLink: Bücher. Springer, [Online]. Available
    • A. Jain, A. Ross, and K. Nandakumar, Introduction to Biometrics, ser. SpringerLink: Bücher. Springer, 2011. [Online]. Available: http://books.google.com/books?id=ZPt2xrZFtzkC
    • (2011) Introduction to Biometrics
    • Jain, A.1    Ross, A.2    Nandakumar, K.3
  • 16
    • 0025384135 scopus 로고
    • Identity authentication based on keystroke latencies
    • Feb. [Online]. Available
    • R. Joyce and G. Gupta, “Identity authentication based on keystroke latencies,” Commun. ACM, vol. 33, no. 2, pp. 168–176, Feb. 1990. [Online]. Available: http://doi.acm.org/10.1145/75577.75582
    • (1990) Commun. ACM , vol.33 , Issue.2 , pp. 168-176
    • Joyce, R.1    Gupta, G.2
  • 19
    • 77958105748 scopus 로고    scopus 로고
    • Improving mouse dynamics biometric performance using variance reduction via extractors with separate features
    • Nov. [Online]. Available
    • Y. Nakkabi, I. Traoré, and A. A. E. Ahmed, “Improving mouse dynamics biometric performance using variance reduction via extractors with separate features,” Trans. Sys. Man Cyber. Part A, vol. 40, no. 6, pp. 1345–1353, Nov. 2010. [Online]. Available: http://dx.doi.org/10.1109/TSMCA.2010.2052602
    • (2010) Trans. Sys. Man Cyber. Part A , vol.40 , Issue.6 , pp. 1345-1353
    • Nakkabi, Y.1    Traoré, I.2    Ahmed, A. A. E.3
  • 20
    • 85059263154 scopus 로고    scopus 로고
    • [Online]. Available
    • L. Nara, “Hand electrodes brass (1 pair),” 2013. [Online]. Available: http://www.lyranara.com/hand-electrodes-brass-1-pair/
    • (2013) Hand electrodes brass (1 pair)
    • Nara, L.1
  • 22
    • 85180636174 scopus 로고    scopus 로고
    • Your face is not your password: Face authentication bypassing - lenovo - asus - toshiba
    • Feb. last accessed 03.08.2013. [Online]. Available
    • M. D. Nguyen and Q. M. Bui, “Your face is not your password: Face authentication bypassing - lenovo - asus - toshiba,” in In briefings of 2009 Black Hat Conference, Feb. 2009, last accessed 03.08.2013. [Online]. Available: http://www.blackhat.com/presentations/bh-dc-09/Nguyen/BlackHat-DC-09-Nguyen-Face-not-your-password-slides.pdf
    • (2009) briefings of 2009 Black Hat Conference
    • Nguyen, M. D.1    Bui, Q. M.2
  • 23
    • 78649425712 scopus 로고    scopus 로고
    • Continuous user authentication using temporal information
    • B. K. Kumar, S. Prabhakar, and A. A. Ross, Eds. SPIE
    • K. Niinuma and A. K. Jain, “Continuous user authentication using temporal information,” in Biometric Technology for Human Identification VII, B. V. K. V. Kumar, S. Prabhakar, and A. A. Ross, Eds., vol. 7667, no. 1. SPIE, 2010.
    • (2010) Biometric Technology for Human Identification VII , vol.7667 , Issue.1
    • Niinuma, K.1    Jain, A. K.2
  • 24
    • 0042585206 scopus 로고    scopus 로고
    • Keystroke dynamics based authentication
    • A. K. Jain, R. Bolle, and S. Pankanti, Eds. Springer US
    • M. S. Obaidat and B. Sadoun, “Keystroke dynamics based authentication,” in Biometrics, A. K. Jain, R. Bolle, and S. Pankanti, Eds. Springer US, 2002, pp. 213–229.
    • (2002) Biometrics , pp. 213-229
    • Obaidat, M. S.1    Sadoun, B.2
  • 25
    • 85010724737 scopus 로고    scopus 로고
    • I. T. L. N. I. of Standards and Technology, [Online]. Available
    • I. T. L. N. I. of Standards and Technology, “The biometrics resource center,” 2013. [Online]. Available: http://www.nist.gov/itl/csd/biometrics/index.cfm
    • (2013) The biometrics resource center
  • 29
    • 12844256823 scopus 로고
    • Keyboard apparatus for personal identification
    • R. Spillane, “Keyboard apparatus for personal identification,” IBM Technical Disclosure Bulletin, vol. 17, no. 3346, 1975.
    • (1975) IBM Technical Disclosure Bulletin , vol.17 , Issue.3346
    • Spillane, R.1
  • 30
    • 85010753240 scopus 로고    scopus 로고
    • Wikipedia, [Online]. Available
    • Wikipedia, “Sensitivity and specificity,” 2013. [Online]. Available: http://en.wikipedia.org/wiki/Sensitivity_and_specificity
    • (2013) Sensitivity and specificity
  • 31
    • 8844265659 scopus 로고    scopus 로고
    • ser. RSA Press Series. McGraw-Hill/Osborne, [Online]. Available
    • J. Woodward, N. Orlans, and P. Higgins, Biometrics, ser. RSA Press Series. McGraw-Hill/Osborne, 2003. [Online]. Available: http://books.google.com/books?id=j-o_btaFK6wC
    • (2003) Biometrics
    • Woodward, J.1    Orlans, N.2    Higgins, P.3
  • 32
    • 70350234989 scopus 로고    scopus 로고
    • Behavioural biometrics; a survey and classification
    • Jun. [Online]. Available
    • R. V. Yampolskiy and V. Govindaraju, “Behavioural biometrics; a survey and classification,” Int. J. Biometrics, vol. 1, no. 1, pp. 81–113, Jun. 2008. [Online]. Available: http://dx.doi.org/10.1504/IJBM.2008.018665
    • (2008) Int. J. Biometrics , vol.1 , Issue.1 , pp. 81-113
    • Yampolskiy, R. V.1    Govindaraju, V.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.