Cross Keyboard Keystroke Dynamics
暂无分享,去创建一个
[1] L. O'Gorman,et al. Comparing passwords, tokens, and biometrics for user authentication , 2003, Proceedings of the IEEE.
[2] Roy A. Maxion,et al. Comparing anomaly-detection algorithms for keystroke dynamics , 2009, 2009 IEEE/IFIP International Conference on Dependable Systems & Networks.
[3] Christophe Rosenberger,et al. Soft biometrics database: A benchmark for keystroke dynamics biometric systems , 2013, 2013 International Conference of the BIOSIG Special Interest Group (BIOSIG).
[4] Damon L. Woodard,et al. Biometric Authentication and Identification using Keystroke Dynamics: A Survey , 2012 .
[5] Patrick Bours,et al. Performance of keystroke dynamics when allowing typing corrections , 2014, 2nd International Workshop on Biometrics and Forensics.
[6] Stephanie Schuckers,et al. Shared research dataset to support development of keystroke authentication , 2014, IEEE International Joint Conference on Biometrics.
[7] Baptiste Hemery,et al. Unconstrained keystroke dynamics authentication with shared secret , 2011, Comput. Secur..
[8] Wm. Arthur Conklin,et al. Password-based authentication: a system perspective , 2004, 37th Annual Hawaii International Conference on System Sciences, 2004. Proceedings of the.
[9] Andrew Beng Jin Teoh,et al. A Survey of Keystroke Dynamics Biometrics , 2013, TheScientificWorldJournal.
[10] Julian Fiérrez,et al. Keystroke dynamics recognition based on personal data: A comparative experimental evaluation implementing reproducible research , 2015, 2015 IEEE 7th International Conference on Biometrics Theory, Applications and Systems (BTAS).
[11] Baochang Zhang,et al. Study on the BeiHang Keystroke Dynamics Database , 2011, 2011 International Joint Conference on Biometrics (IJCB).
[12] Roy A. Maxion,et al. Free vs. transcribed text for keystroke-dynamics evaluations , 2012, LASER '12.
[13] Noble Harter,et al. Studies in the physiology and psychology of the telegraphic language , 1897 .
[14] Claudia Picardi,et al. User authentication through keystroke dynamics , 2002, TSEC.
[15] Norman Shapiro,et al. Authentication by Keystroke Timing: Some Preliminary Results , 1980 .