An Adaptive Approach Towards the Selection of Multi-Factor Authentication
暂无分享,去创建一个
[1] Yi Chen,et al. Advanced Technologies for Touchless Fingerprint Recognition , 2009, Handbook of Remote Biometrics.
[2] Claus Vielhauer. Biometric User Authentication for it Security - From Fundamentals to Handwriting , 2006, Advances in Information Security.
[3] Sharath Pankanti,et al. An identity-authentication system using fingerprints , 1997, Proc. IEEE.
[4] Vir V. Phoha,et al. Continuous authentication with cognition-centric text production and revision features , 2014, IEEE International Joint Conference on Biometrics.
[5] Kalyanmoy Deb,et al. An Adaptive Approach for Active Multi-Factor Authentication , 2014 .
[6] Anil K. Jain,et al. Continuous user authentication using temporal information , 2010, Defense + Commercial Sensing.
[7] Larry S. Davis,et al. Screen Fingerprints: A Novel Modality for Active Authentication , 2013, IT Professional.
[8] Dipankar Dasgupta,et al. An adaptive approach for continuous multi-factor authentication in an identity eco-system , 2014, CISR '14.
[9] A. Singh. Exponential Distribution: Theory, Methods and Applications , 1996 .
[10] KyungHee Lee,et al. Two-factor face authentication using matrix permutation transformation and a user password , 2014, Inf. Sci..
[11] Richard P. Guidorizzi. Security: Active Authentication , 2013, IT Prof..
[12] J. Perry,et al. Genetic Algorithm Optimisation of Mathematical Models Using Distributed Computing , 2005, Applied Intelligence.
[13] Claudia Picardi,et al. Keystroke analysis of free text , 2005, TSEC.
[14] Anil K. Jain,et al. Fingerprint Reconstruction: From Minutiae to Phase , 2011, IEEE Transactions on Pattern Analysis and Machine Intelligence.
[15] Dipankar Dasgupta,et al. Human-Cognition-Based CAPTCHAs , 2015, IT Professional.
[16] David G. Luenberger,et al. Linear and nonlinear programming , 1984 .
[17] Ingo Deutschmann,et al. Behavioral biometrics for DARPA's Active Authentication program , 2013, 2013 International Conference of the BIOSIG Special Interest Group (BIOSIG).
[18] David W. Aha,et al. User Authentication from Web Browsing Behavior , 2013, FLAIRS.
[19] R. Ciupa,et al. International Conference , 2023, In Vitro Cellular & Developmental Biology - Animal.
[20] Anil K. Jain,et al. Fingerprint Matching , 2010, Computer.
[21] Sung-Hyuk Cha,et al. An investigation of keystroke and stylometry traits for authenticating online test takers , 2011, 2011 International Joint Conference on Biometrics (IJCB).
[22] Konrad Rieck,et al. Continuous Authentication on Mobile Devices by Analysis of Typing Motion Behavior , 2014, Sicherheit.
[23] Tao Feng,et al. Continuous mobile authentication using touchscreen gestures , 2012, 2012 IEEE Conference on Technologies for Homeland Security (HST).
[24] Rachel Greenstadt,et al. Adversarial stylometry: Circumventing authorship recognition to preserve privacy and anonymity , 2012, TSEC.
[25] Kevin Kwok,et al. User Identification and Characterization From Web Browsing Behavior , 2012 .
[26] Eric Klieme,et al. Poster : Towards Continuous Authentication Based On Mobile Messaging App Usage , 2014 .
[27] Rajesh Kumar,et al. Context-Aware Active Authentication Using Smartphone Accelerometer Measurements , 2014, 2014 IEEE Conference on Computer Vision and Pattern Recognition Workshops.
[28] Vir V. Phoha,et al. Scan-Based Evaluation of Continuous Keystroke Authentication Systems , 2013, IT Professional.
[29] Takeo Kanade,et al. An Iterative Image Registration Technique with an Application to Stereo Vision , 1981, IJCAI.
[30] Hamid Jahankhani,et al. A Survey of User Authentication Based on Mouse Dynamics , 2008 .
[31] Sung-Hyuk Cha,et al. Behavioral biometric verification of student identity in online course assessment and authentication of authors in literary works , 2013, 2013 IEEE Sixth International Conference on Biometrics: Theory, Applications and Systems (BTAS).