Mobile authentication for software engineering: A case study of research and development student projects
暂无分享,去创建一个
[1] Gary M. Weiss,et al. Activity recognition using cell phone accelerometers , 2011, SKDD.
[2] Jacob O. Wobbrock,et al. TapSongs: tapping rhythm-based passwords on a single binary sensor , 2009, UIST '09.
[3] Peter M. Corcoran,et al. Biometrics and Consumer Electronics: A Brave New World or the Road to Dystopia? [Soapbox] , 2013, IEEE Consumer Electronics Magazine.
[4] Zachary N. J. Peterson,et al. Security through play , 2013, IEEE Security & Privacy.
[5] Hai Huang,et al. You Are How You Touch: User Verification on Smartphones via Tapping Behaviors , 2014, 2014 IEEE 22nd International Conference on Network Protocols.
[6] Roger S. Pressman,et al. Software Engineering: A Practitioner's Approach , 1982 .
[7] Luís Carriço,et al. Under the table: tap authentication for smartphones , 2013, BCS HCI.
[8] Kwontaeg Choi,et al. Realtime training on mobile devices for face recognition applications , 2011, Pattern Recognit..
[9] Raymond N. J. Veldhuis,et al. Biometric Authentication for a Mobile Personal Device , 2006 .
[10] Xiannong Meng,et al. Approaches to Undergraduate Instruction in Computer Security , 2005 .
[11] Stanislav Kurkovsky,et al. Experiments with Simple Iris Recognition for Mobile Phones , 2010, 2010 Seventh International Conference on Information Technology: New Generations.
[12] Chun Wai Liew,et al. Scrum and Agile Methods in Software Engineering Courses , 2016, SIGCSE.
[13] Marimuthu Palaniswami,et al. Internet of Things (IoT): A vision, architectural elements, and future directions , 2012, Future Gener. Comput. Syst..
[14] John Daugman,et al. High Confidence Visual Recognition of Persons by a Test of Statistical Independence , 1993, IEEE Trans. Pattern Anal. Mach. Intell..
[15] Ming Yang,et al. Learning mobile security with android security labware , 2013, SIGCSE '13.
[16] Sheikh Ghafoor,et al. Empowering faculty to embed security topics into computer science courses , 2014, ITiCSE '14.
[17] Raul Sánchez-Reillo,et al. Handwritten signature recognition in mobile scenarios: Performance evaluation , 2012, 2012 IEEE International Carnahan Conference on Security Technology (ICCST).