Usability evaluation of multi-modal biometric verification systems
暂无分享,去创建一个
Luis A. Hernández Gómez | Doroteo Torre Toledano | Rubén Fernández Pozo | Álvaro Hernández Trapote | D. Toledano | L. A. H. Gómez
[1] Sharon L. Oviatt,et al. Multimodal interface research: a science without borders , 2000, INTERSPEECH.
[2] H. Gish,et al. Text-independent speaker identification , 1994, IEEE Signal Processing Magazine.
[3] Fernando L. Podio. Biometrics - Technologies for Highly Secure Personal Authentication , 2001 .
[4] David Zhang. Biometric solutions : for authentication in an E-world , 2002 .
[5] Philip R. Zimmermann,et al. The official PGP user's guide , 1996 .
[6] Václav Matyás,et al. Biometric authentication - security and usability , 2002, Communications and Multimedia Security.
[7] Takeo Kanade,et al. Picture Processing System by Computer Complex and Recognition of Human Faces , 1974 .
[8] R. Khanna,et al. Evaluation of automated biometrics-based identification and verification systems , 1997, Proc. IEEE.
[9] D. Reynolds,et al. Authentication gets personal with biometrics , 2004, IEEE Signal Processing Magazine.
[10] Paul van Schaik,et al. Using on-line surveys to measure three key constructs of the quality of human-computer interaction in web sites: psychometric properties and implications , 2003, Int. J. Hum. Comput. Stud..
[11] J. L. Wayman,et al. Best practices in testing and reporting performance of biometric devices. , 2002 .
[12] Mary Ellen Zurko,et al. User-centered security , 1996, NSPW '96.
[13] Bruce Schneier,et al. Beyond fear - thinking sensibly about security in an uncertain world , 2003 .
[14] Roberto Brunelli,et al. Person identification using multiple cues , 1995, IEEE Transactions on Pattern Analysis and Machine Intelligence.
[15] Gilbert Cockton,et al. People and Computers XIV — Usability or Else! , 2000, Springer London.
[16] Satoshi Hoshino,et al. Impact of artificial "gummy" fingers on fingerprint systems , 2002, IS&T/SPIE Electronic Imaging.
[17] Douglas A. Reynolds,et al. The NIST speaker recognition evaluation - Overview, methodology, systems, results, perspective , 2000, Speech Commun..
[18] Bruce Schneier,et al. Secrets and Lies: Digital Security in a Networked World , 2000 .
[19] Kasper Hornbæk,et al. Measuring usability: are effectiveness, efficiency, and satisfaction really correlated? , 2000, CHI.
[20] P. Jonathon Phillips,et al. An Introduction to Evaluating Biometric Systems , 2000, Computer.
[21] B.S. Atal,et al. Automatic recognition of speakers from their voices , 1976, Proceedings of the IEEE.
[22] Daniel Vogel,et al. Interactive public ambient displays: transitioning from implicit to explicit, public to personal, interaction with multiple users , 2004, UIST '04.
[23] Samy Bengio,et al. A multi-sample multi-source model for biometric authentication , 2002, Proceedings of the 12th IEEE Workshop on Neural Networks for Signal Processing.
[24] Jr. J.P. Campbell,et al. Speaker recognition: a tutorial , 1997, Proc. IEEE.
[25] S. Liu,et al. A practical guide to biometric security technology , 2001 .
[26] Batya Friedman,et al. Informed consent in the Mozilla browser: implementing value-sensitive design , 2002, Proceedings of the 35th Annual Hawaii International Conference on System Sciences.
[27] Andrew S. Patrick,et al. Usability and Acceptability of Biometric Security Systems , 2004, Financial Cryptography.
[28] M. Angela Sasse,et al. Are Passfaces More Usable Than Passwords? A Field Trial Investigation , 2000, BCS HCI.
[29] J. Doug Tygar,et al. Why Johnny Can't Encrypt: A Usability Evaluation of PGP 5.0 , 1999, USENIX Security Symposium.