Fighting Identity Fraud with the Addition of Biometric Techniques
暂无分享,去创建一个
[1] Mohammad S. Obaidat,et al. Verification of computer users using keystroke dynamics , 1997, IEEE Trans. Syst. Man Cybern. Part B.
[2] Doug Mahar,et al. Optimizing digraph-latency based biometric typist verification systems: inter and intra typist differences in digraph latency distributions , 1995, Int. J. Hum. Comput. Stud..
[3] Fabian Monrose,et al. Keystroke dynamics as a biometric for authentication , 2000, Future Gener. Comput. Syst..
[4] Claudia Picardi,et al. User authentication through keystroke dynamics , 2002, TSEC.
[5] Norman Shapiro,et al. Authentication by Keystroke Timing: Some Preliminary Results , 1980 .
[6] B. Hussien,et al. Computer-Access Security Systems Using Keystroke Dynamics , 1990, IEEE Trans. Pattern Anal. Mach. Intell..
[7] Gopal K. Gupta,et al. Identity authentication based on keystroke latencies , 1990, Commun. ACM.
[8] Jane M. Carey,et al. Human factors in management information systems , 1988 .