Keystroke dynamics-based authentication for mobile devices
暂无分享,去创建一个
[1] Tom Fawcett,et al. An introduction to ROC analysis , 2006, Pattern Recognit. Lett..
[2] Steven Furnell,et al. Authenticating mobile phone users using keystroke analysis , 2006, International Journal of Information Security.
[3] Steven Furnell,et al. Authentication of users on mobile telephones - A survey of attitudes and practices , 2005, Comput. Secur..
[4] David Umphress,et al. Identity Verification Through Keyboard Characteristics , 1985, Int. J. Man Mach. Stud..
[5] Steven Furnell,et al. Advanced user authentication for mobile devices , 2007, Comput. Secur..
[6] Sungzoon Cho,et al. Improving authentication accuracy using artificial rhythms and cues for keystroke dynamics-based authentication , 2009, Expert Syst. Appl..
[7] Stewart Kowalski,et al. Consumers ’ Awareness of , Attitudes Towards and Adoption of Mobile Phone Security , 2006 .
[8] Norman Shapiro,et al. Authentication by Keystroke Timing: Some Preliminary Results , 1980 .
[9] G. D. Chen,et al. Ubiquitous learning website: Scaffold learners by mobile devices with information-aware techniques , 2008, Comput. Educ..
[10] Sungzoon Cho,et al. Artificial Rhythms and Cues for Keystroke Dynamics Based Authentication , 2006, ICB.
[11] Matteo Golfarelli,et al. On the Error-Reject Trade-Off in Biometric Verification Systems , 1997, IEEE Trans. Pattern Anal. Mach. Intell..