Recent Advances in the Development of a Long-Text-Input Keystroke Biometric Authentication System for Arbitrary Text Input
暂无分享,去创建一个
[1] Sahin Albayrak,et al. Continuous and non-intrusive identity verification in real-time environments based on free-text keystroke dynamics , 2011, 2011 International Joint Conference on Biometrics (IJCB).
[2] Roy A. Maxion,et al. Comparing anomaly-detection algorithms for keystroke dynamics , 2009, 2009 IEEE/IFIP International Conference on Dependable Systems & Networks.
[3] Sung-Hyuk Cha,et al. Performance of a long-text-input keystroke biometric authentication system using an improved k-nearest-neighbor classification method , 2010, 2010 Fourth IEEE International Conference on Biometrics: Theory, Applications and Systems (BTAS).
[4] Sung-Hyuk Cha,et al. A Keystroke Biometric Systemfor Long-Text Input , 2010, Int. J. Inf. Secur. Priv..
[5] Claudia Picardi,et al. Keystroke analysis of free text , 2005, TSEC.
[6] Sung-Hyuk Cha,et al. Developing a Keystroke Biometric System for Continual Authentication of Computer Users , 2012, 2012 European Intelligence and Security Informatics Conference.
[7] M. Akila,et al. Biometric personal authentication using keystroke dynamics: A review , 2011, Appl. Soft Comput..
[8] Sung-Hyuk Cha,et al. A Keystroke Biometric System for Long-Text Input , 2013 .
[9] Michael K. Reiter,et al. Password hardening based on keystroke dynamics , 1999, CCS '99.
[10] Sung-Hyuk Cha,et al. On the Individuality of the Iris Biometric , 2005, ICIAR.
[11] Michael Achatz,et al. On the Design of an Authentication System Based on Keystroke Dynamics Using a Predefined Input Text , 2007, Int. J. Inf. Secur. Priv..
[12] John J. Leggett,et al. Dynamic Identity Verification via Keystroke Characteristics , 1991, Int. J. Man Mach. Stud..
[13] E. Steele,et al. Higher Education Opportunity Act , 2014 .
[14] Sharath Pankanti,et al. Guide to Biometrics , 2003, Springer Professional Computing.
[15] Lee Luan Ling,et al. Biometric Access Control Through Numerical Keyboards Based on Keystroke Dynamics , 2006, ICB.
[16] Sung-Hyuk Cha,et al. Writer Identification: Statistical Analysis and Dichotomizer , 2000, SSPR/SPR.
[17] Baochang Zhang,et al. Study on the BeiHang Keystroke Dynamics Database , 2011, 2011 International Joint Conference on Biometrics (IJCB).
[18] Chih-Ming Hsieh,et al. The Effect of Keyboard Key Spacing on Typing Speed, Error, Usability, and Biomechanics, Part 2 , 2014, Hum. Factors.
[19] Douglas A. Reynolds,et al. SHEEP, GOATS, LAMBS and WOLVES A Statistical Analysis of Speaker Performance in the NIST 1998 Speaker Recognition Evaluation , 1998 .
[20] Claudia Picardi,et al. User authentication through keystroke dynamics , 2002, TSEC.
[21] Kenneth Revett,et al. Behavioral Biometrics: A Remote Access Approach , 2008 .
[22] Xian Ke,et al. Typing patterns: a key to user identification , 2004, IEEE Security & Privacy Magazine.
[23] Christophe Rosenberger,et al. Keystroke dynamics with low constraints SVM based passphrase enrollment , 2009, 2009 IEEE 3rd International Conference on Biometrics: Theory, Applications, and Systems.