User-Friendly Free-Text Keystroke Dynamics Authentication for Practical Applications
暂无分享,去创建一个
[1] Jiankun Hu,et al. A k-Nearest Neighbor Approach for User Authentication through Biometric Keystroke Dynamics , 2008, 2008 IEEE International Conference on Communications.
[2] Xia Liu,et al. Enhanced User Authentication Through Keystroke Biometrics , 2004 .
[3] Andrew Beng Jin Teoh,et al. Statistical Fusion Approach on Keystroke Dynamics , 2007, 2007 Third International IEEE Conference on Signal-Image Technologies and Internet-Based System.
[4] Saurabh Singh,et al. Key Classification: A New Approach in Free Text Keystroke Authentication System , 2011, 2011 Third Pacific-Asia Conference on Circuits, Communications and System (PACCS).
[5] M. Akila,et al. Biometric personal authentication using keystroke dynamics: A review , 2011, Appl. Soft Comput..
[6] Sungzoon Cho,et al. User authentication based on keystroke analysis of long free texts with a reduced number of features , 2010, 2010 Second International Conference on Communication Systems, Networks and Applications.
[7] Sung-Hyuk Cha,et al. Keystroke Biometric Recognition on Long-Text Input: A Feasibility Study , 2006 .
[8] Fabian Monrose,et al. Authentication via keystroke dynamics , 1997, CCS '97.
[9] Kevin Warwick,et al. Keystroke Dynamics Authentication: A Survey of Free-text Methods , 2013 .
[10] Ian H. Witten,et al. One-Class Classification by Combining Density and Class Probability Estimation , 2008, ECML/PKDD.
[11] Damon L. Woodard,et al. Biometric Authentication and Identification using Keystroke Dynamics: A Survey , 2012 .
[12] Christophe Rosenberger,et al. Analysis of the acquisition process for keystroke dynamics , 2012, 2012 BIOSIG - Proceedings of the International Conference of Biometrics Special Interest Group (BIOSIG).
[13] Jiankun Hu,et al. Correlation Keystroke Verification Scheme for User Access Control in Cloud Computing Environment , 2011, Comput. J..
[14] Prof. D. Raghu,et al. Neural Network Based Authentication and Verification for Web Based Key Stroke Dynamics , 2011 .
[15] Claudia Picardi,et al. Keystroke analysis of free text , 2005, TSEC.
[16] Gopal K. Gupta,et al. Identity authentication based on keystroke latencies , 1990, Commun. ACM.