Proposing Model for Recognizing User Position
暂无分享,去创建一个
[1] Gopal K. Gupta,et al. Identity authentication based on keystroke latencies , 1990, Commun. ACM.
[2] M. Akila,et al. Biometric personal authentication using keystroke dynamics: A review , 2011, Appl. Soft Comput..
[3] Ravi Das. An Introduction to Biometrics , 2014 .
[4] Khalid Saeed,et al. A New Approach for Hand-Palm Recognition , 2005, Enhanced Methods in Computer Security, Biometric and Artificial Intelligence Systems.
[5] Kenneth Revett. A Bioinformatics Based Approach to Behavioural Biometrics , 2007, 2007 Frontiers in the Convergence of Bioscience and Information Technologies.
[6] Klaas Apostol. Brute-force Attack , 2012 .
[7] Rama Chellappa,et al. Discriminant analysis of principal components for face recognition , 1998, Proceedings Third IEEE International Conference on Automatic Face and Gesture Recognition.
[8] Anil K. Jain,et al. Handbook of Fingerprint Recognition , 2005, Springer Professional Computing.
[9] Mohammad S. Obaidat,et al. Verification of computer users using keystroke dynamics , 1997, IEEE Trans. Syst. Man Cybern. Part B.
[10] Fabian Monrose,et al. Keystroke dynamics as a biometric for authentication , 2000, Future Gener. Comput. Syst..
[11] Norman Shapiro,et al. Authentication by Keystroke Timing: Some Preliminary Results , 1980 .
[12] John Daugman,et al. How iris recognition works , 2002, IEEE Transactions on Circuits and Systems for Video Technology.
[13] Rama Chellappa,et al. Discriminant analysis of principal components for face recognition , 1998 .