A New Non-Intrusive Authentication Method Based on the Orientation Sensor for Smartphone Users
暂无分享,去创建一个
[1] Mohammad Najmud Doja,et al. USER AUTHENTICATION SCHEMES FOR MOBILE AND HANDHELD DEVICES , 2008 .
[2] Steven Furnell,et al. Flexible and Transparent User Authentication for Mobile Devices , 2009, SEC.
[3] Jouni Markkula,et al. An integrated identity verification system for mobile terminals , 2005, Inf. Manag. Comput. Security.
[4] Dexin Zhang,et al. DCT-Based Iris Recognition , 2007, IEEE Transactions on Pattern Analysis and Machine Intelligence.
[5] Heikki Ailisto,et al. Increasing Security of Mobile Devices by Decreasing User Effort in Verification , 2007, 2007 Second International Conference on Systems and Networks Communications (ICSNC 2007).
[6] Mauro Conti,et al. Mind how you answer me!: transparently authenticating the user of a smartphone when answering or placing a call , 2011, ASIACCS '11.
[7] Jie Yang,et al. Sweep fingerprint sequence reconstruction for portable devices , 2006 .
[8] Berrin A. Yanikoglu,et al. Identity authentication using improved online signature verification method , 2005, Pattern Recognit. Lett..
[9] Douglas A. Reynolds,et al. SHEEP, GOATS, LAMBS and WOLVES A Statistical Analysis of Speaker Performance in the NIST 1998 Speaker Recognition Evaluation , 1998 .
[10] Claudia Picardi,et al. User authentication through keystroke dynamics , 2002, TSEC.
[11] Nalini K. Ratha,et al. Biometric perils and patches , 2002, Pattern Recognit..
[12] Patrick Bours,et al. Improved Cycle Detection for Accelerometer Based Gait Authentication , 2010, 2010 Sixth International Conference on Intelligent Information Hiding and Multimedia Signal Processing.
[13] Kuanquan Wang,et al. Palmprint Texture Analysis Using Derivative of Gaussian Filters , 2006, 2006 International Conference on Computational Intelligence and Security.
[14] Steven Furnell,et al. Authenticating mobile phone users using keystroke analysis , 2006, International Journal of Information Security.
[15] YanikogluBerrin,et al. Identity authentication using improved online signature verification method , 2005 .
[16] Kirsi Helkala,et al. Biometric Gait Authentication Using Accelerometer Sensor , 2006, J. Comput..
[17] R. Tibshirani,et al. Improvements on Cross-Validation: The 632+ Bootstrap Method , 1997 .
[18] L. O'Gorman,et al. Comparing passwords, tokens, and biometrics for user authentication , 2003, Proceedings of the IEEE.
[19] Ahmed Awad E. Ahmed,et al. A New Biometric Technology Based on Mouse Dynamics , 2007, IEEE Transactions on Dependable and Secure Computing.
[20] Reto Meier. Professional Android Application Development , 2008 .
[21] Steven Furnell,et al. Beyond the PIN: Enhancing user authentication for mobile devices , 2008 .
[22] Jun Yang,et al. SenGuard: Passive user identification on smartphones using multiple sensors , 2011, 2011 IEEE 7th International Conference on Wireless and Mobile Computing, Networking and Communications (WiMob).
[23] Anil K. Jain,et al. FVC2000: Fingerprint Verification Competition , 2002, IEEE Trans. Pattern Anal. Mach. Intell..
[24] Hamid Jahankhani,et al. A Survey of User Authentication Based on Mouse Dynamics , 2008 .