Have you permission to answer this phone?
暂无分享,去创建一个
[1] Sacha Brostoff,et al. Transforming the ‘Weakest Link’ — a Human/Computer Interaction Approach to Usable and Effective Security , 2001 .
[2] Maria De Marsico,et al. Embedded Accelerometer Signal Normalization for Cross-Device Gait Recognition , 2016, 2016 International Conference of the Biometrics Special Interest Group (BIOSIG).
[3] Michele Nappi,et al. FIRME: Face and Iris Recognition for Mobile Engagement , 2014, Image Vis. Comput..
[4] Michele Nappi,et al. Mobile Iris Challenge Evaluation (MICHE)-I, biometric iris dataset and protocols , 2015, Pattern Recognit. Lett..
[5] Albrecht Schmidt,et al. Implicit human computer interaction through context , 2000, Personal Technologies.
[6] Andrea F. Abate,et al. I-Am: Implicitly Authenticate Me—Person Authentication on Mobile Devices Through Ear Shape and Arm Gesture , 2019, IEEE Transactions on Systems, Man, and Cybernetics: Systems.
[7] Paul A. Viola,et al. Rapid object detection using a boosted cascade of simple features , 2001, Proceedings of the 2001 IEEE Computer Society Conference on Computer Vision and Pattern Recognition. CVPR 2001.
[8] Antonella De Angeli,et al. Usability and biometric verification at the ATM interface , 2003, CHI '03.
[9] Andrew S. Patrick,et al. Usability and Acceptability of Biometric Security Systems , 2004, Financial Cryptography.
[10] Maria De Marsico,et al. Biometric Walk Recognizer , 2015, ICIAP Workshops.