Design and implementation of a RFID-based authentication system by using keystroke dynamics
暂无分享,去创建一个
[1] Sharath Pankanti,et al. Biometrics: a tool for information security , 2006, IEEE Transactions on Information Forensics and Security.
[2] Fabian Monrose,et al. Keystroke dynamics as a biometric for authentication , 2000, Future Gener. Comput. Syst..
[3] Norman Shapiro,et al. Authentication by Keystroke Timing: Some Preliminary Results , 1980 .
[4] Sungzoon Cho,et al. Keystroke dynamics identity verification - its problems and practical solutions , 2004, Comput. Secur..
[5] Sungzoon Cho,et al. Web-Based Keystroke Dynamics Identity Verification Using Neural Network , 2000, J. Organ. Comput. Electron. Commer..
[6] John J. Leggett,et al. Dynamic Identity Verification via Keystroke Characteristics , 1991, Int. J. Man Mach. Stud..
[7] Marcus Brown,et al. User Identification via Keystroke Characteristics of Typed Names using Neural Networks , 1993, Int. J. Man Mach. Stud..
[8] Christine L. MacKenzie,et al. Computer user verification using login string keystroke dynamics , 1998, IEEE Trans. Syst. Man Cybern. Part A.
[9] Cole Pickering,et al. Smart Card , 2009, Encyclopedia of Biometrics.
[10] Fabian Monrose,et al. Authentication via keystroke dynamics , 1997, CCS '97.
[11] Mohammad S. Obaidat,et al. Verification of computer users using keystroke dynamics , 1997, IEEE Trans. Syst. Man Cybern. Part B.