Different strokes for different folks? Revealing the physical characteristics of smartphone users from their swipe gestures
暂无分享,去创建一个
[1] O. J. Dunn. Multiple Comparisons Using Rank Sums , 1964 .
[2] I. Ilayperuma,et al. Prediction of personal stature based on the hand length , 2009 .
[3] Vivek Kanhangad,et al. Exploring orientation and accelerometer sensor data for personal authentication in smartphones using touchscreen gestures , 2015, Pattern Recognit. Lett..
[4] L Meadows,et al. Estimation of stature from metacarpal lengths. , 1992, Journal of forensic sciences.
[5] Roger Wattenhofer,et al. A personal touch: recognizing users based on touch screen behavior , 2012, PhoneSense '12.
[6] Jun Yang,et al. SenGuard: Passive user identification on smartphones using multiple sensors , 2011, 2011 IEEE 7th International Conference on Wireless and Mobile Computing, Networking and Communications (WiMob).
[7] Claire C. Gordon,et al. 2012 Anthropometric Survey of U.S. Army Personnel: Methods and Summary Statistics , 2014 .
[8] Roy A. Maxion,et al. Comparing anomaly-detection algorithms for keystroke dynamics , 2009, 2009 IEEE/IFIP International Conference on Dependable Systems & Networks.
[9] J W Garrett,et al. The Adult Human Hand: Some Anthropometric and Biomechanical Considerations , 1971, Human factors.
[10] Steven Furnell,et al. Authentication of users on mobile telephones - A survey of attitudes and practices , 2005, Comput. Secur..
[11] György Doczi. The Power of Limits: Proportional Harmonies in Nature, Art, and Architecture , 1981 .
[12] Cormac Herley,et al. More Is Not the Answer , 2014, IEEE Security & Privacy.
[13] Fabian Monrose,et al. Keystroke dynamics as a biometric for authentication , 2000, Future Gener. Comput. Syst..
[14] Robert M. White. Comparative Anthropometry of the Hand , 1980 .
[15] Muddassar Farooq,et al. Keystroke-Based User Identification on Smart Phones , 2009, RAID.
[16] Yang Zhang,et al. Fingerprint attack against touch-enabled devices , 2012, SPSM '12.
[17] Haining Wang,et al. An efficient user verification system via mouse movements , 2011, CCS '11.
[18] Richard E. Ladner,et al. PassChords: secure multi-touch authentication for blind people , 2012, ASSETS '12.
[19] Dawn Xiaodong Song,et al. Touchalytics: On the Applicability of Touchscreen Input as a Behavioral Biometric for Continuous Authentication , 2012, IEEE Transactions on Information Forensics and Security.
[20] Heinrich Hußmann,et al. Touch me once and i know it's you!: implicit authentication based on touch screen patterns , 2012, CHI.
[21] Hamza Erol,et al. Stature estimation based on hand length and foot length , 2005, Clinical anatomy.
[22] Roy A. Maxion,et al. Keystroke biometrics with number-pad input , 2010, 2010 IEEE/IFIP International Conference on Dependable Systems & Networks (DSN).
[23] Matthew B. Parkinson,et al. Predicting 5th and 95th Percentile Anthropometric Segment Lengths From Population Stature , 2008, DAC 2008.
[24] Daniel J. Wigdor,et al. Typing on flat glass: examining ten-finger expert typing patterns on touch surfaces , 2011, CHI.
[25] Chikkannan Eswaran,et al. An unobtrusive Android person verification using accelerometer based gait , 2012, MoMM '12.
[26] Cheng-Jung Tsai,et al. A graphical-based password keystroke dynamic authentication system for touch screen handheld mobile devices , 2012, J. Syst. Softw..
[27] Nasir D. Memon,et al. Biometric-rich gestures: a novel approach to authentication on multi-touch devices , 2012, CHI.
[28] R DRILLIS,et al. BODY SEGMENT PARAMETERS; A SURVEY OF MEASUREMENT TECHNIQUES. , 1964, Artificial limbs.
[29] John T. McConville,et al. Anthropometric Survey of U.S. Army Personnel: Methods and Summary Statistics 1988 , 1989 .
[30] M. Angela Sasse,et al. Users are not the enemy , 1999, CACM.
[31] Xiang-Yang Li,et al. SilentSense: silent user identification via touch and movement behavioral biometrics , 2013, MobiCom.
[32] Marjory Da Costa-Abreu,et al. Using keystroke dynamics for gender identification in social network environment , 2011, ICDP.
[33] Guoliang Xue,et al. Unobservable Re-authentication for Smartphones , 2013, NDSS.
[34] Vyas Sekar,et al. Measuring user confidence in smartphone security and privacy , 2012, SOUPS.
[35] Sebastian Möller,et al. On the need for different security methods on mobile phones , 2011, Mobile HCI.
[36] Robert A. Walker,et al. Anthropometric Survey of U.S. Army Personnel: Summary Statistics, Interim Report for 1988 , 1989 .
[37] D. Robertson. Body Segment Parameters , 2014 .
[38] Khalid Airowaily,et al. Oily Residuals Security Threat on Smart Phones , 2011, 2011 First International Conference on Robot, Vision and Signal Processing.
[39] Erik Wästlund,et al. Exploring Touch-Screen Biometrics for User Identification on Smart Phones , 2011, PrimeLife.
[40] Georgios Kambourakis,et al. From keyloggers to touchloggers: Take the rough with the smooth , 2013, Comput. Secur..
[41] Damon L. Woodard,et al. Biometric Authentication and Identification using Keystroke Dynamics: A Survey , 2012 .
[42] Youtian Du,et al. User Authentication Through Mouse Dynamics , 2013, IEEE Transactions on Information Forensics and Security.
[43] Christoph Busch,et al. Unobtrusive User-Authentication on Mobile Phones Using Biometric Gait Recognition , 2010, 2010 Sixth International Conference on Intelligent Information Hiding and Multimedia Signal Processing.
[44] nasa,et al. Anthropometric source book. Volume 3: Annotated bibliography of anthropometry , 2013 .
[45] A. M. Ahmed,et al. Prediction of stature from hand measurements. , 1990, Forensic science international.
[46] Tao Feng,et al. Continuous mobile authentication using touchscreen gestures , 2012, 2012 IEEE Conference on Technologies for Homeland Security (HST).
[47] Adam J. Aviv,et al. Smudge Attacks on Smartphone Touch Screens , 2010, WOOT.
[48] Mark S. Young,et al. Kodak's Ergonomic Design for People at Work , 2009 .