A method for ranking authentication products
暂无分享,去创建一个
[1] Hyeonjoon Moon,et al. The FERET evaluation methodology for face-recognition algorithms , 1997, Proceedings of IEEE Computer Society Conference on Computer Vision and Pattern Recognition.
[2] William Stallings,et al. Cryptography and network security , 1998 .
[3] Anil K. Jain,et al. FVC2000: Fingerprint Verification Competition , 2002, IEEE Trans. Pattern Anal. Mach. Intell..
[4] J. L. Wayman,et al. Best practices in testing and reporting performance of biometric devices. , 2002 .
[5] J. Yan,et al. Password memorability and security: empirical results , 2004, IEEE Security & Privacy Magazine.
[6] Dirk Husemann,et al. The smart card: don't leave home without it , 1999, IEEE Concurr..
[7] Henning Gravnås. User’s trust in Biometric Authentication Systems – Do not take the end-users for granted , 2005 .
[8] Julie Bunnell,et al. Word Association Computer Passwords: The Effect of Formulation Techniques on Recall and Guessing Rates , 2000, Comput. Secur..
[9] L. O'Gorman,et al. Comparing passwords, tokens, and biometrics for user authentication , 2003, Proceedings of the IEEE.
[10] Elisa Bertino,et al. Privacy preserving multi-factor authentication with biometrics , 2006, DIM '06.
[11] Anil K. Jain,et al. Handbook of Fingerprint Recognition , 2005, Springer Professional Computing.