Continuous Authentication and Non-repudiation for the Security of Critical Systems
暂无分享,去创建一个
[1] Andrea Bondavalli,et al. Continuous User Identity Verification for Trusted Operators in Control Rooms , 2015, ICA3PP.
[2] Sandeep Kumar,et al. Using continuous biometric verification to protect interactive login sessions , 2005, 21st Annual Computer Security Applications Conference (ACSAC'05).
[3] D. Richard Kuhn,et al. SP 800-32. Introduction to Public Key Technology and the Federal PKI Infrastructure , 2001 .
[4] Hao Feng,et al. Private key generation from on-line handwritten signatures , 2002, Inf. Manag. Comput. Secur..
[5] Berrin A. Yanikoglu,et al. Biometric Cryptosystem Using Online Signatures , 2006, ISCIS.
[6] Andrea Bondavalli,et al. Continuous and Transparent User Identity Verification for Secure Internet Services , 2015, IEEE Transactions on Dependable and Secure Computing.
[7] Jianying Zhou,et al. An intensive survey of fair non-repudiation protocols , 2002, Comput. Commun..
[8] Anil K. Jain,et al. Encyclopedia of Biometrics , 2015, Springer US.
[9] Javier López,et al. Multiparty nonrepudiation: A survey , 2009, CSUR.