Keystroke dynamics authentication for mobile phones
暂无分享,去创建一个
Alessandro Neri | Patrizio Campisi | Emanuele Maiorana | Noelia González-Carballo | P. Campisi | A. Neri | E. Maiorana | Noelia González-Carballo
[1] Danoush Hosseinzadeh,et al. Gaussian Mixture Modeling of Keystroke Patterns for Biometric Applications , 2008, IEEE Transactions on Systems, Man, and Cybernetics, Part C (Applications and Reviews).
[2] Jani Mäntyjärvi,et al. Keystroke recognition for virtual keyboard , 2002, Proceedings. IEEE International Conference on Multimedia and Expo.
[3] B. Hussien,et al. Computer-Access Security Systems Using Keystroke Dynamics , 1990, IEEE Trans. Pattern Anal. Mach. Intell..
[4] Roy A. Maxion,et al. Keystroke biometrics with number-pad input , 2010, 2010 IEEE/IFIP International Conference on Dependable Systems & Networks (DSN).
[5] G. Padmavathi,et al. A Survey of Biometric keystroke Dynamics: Approaches, Security and Challenges , 2009, ArXiv.
[6] Arun Ross,et al. Handbook of Biometrics , 2007 .
[7] Stewart Kowalski,et al. Consumers ’ Awareness of , Attitudes Towards and Adoption of Mobile Phone Security , 2006 .
[8] P. Cochat,et al. Et al , 2008, Archives de pediatrie : organe officiel de la Societe francaise de pediatrie.
[9] A. Shiozaki,et al. Biometric Verification Using Keystroke Motion and Key Press Timing for ATM User Authentication , 2006, 2006 International Symposium on Intelligent Signal Processing and Communications.
[10] Alessandro Neri,et al. User authentication using keystroke dynamics for cellular phones , 2009 .
[11] Hui Chen,et al. Score Based Biometric Template Selection and Update , 2008, 2008 Second International Conference on Future Generation Communication and Networking.
[12] James C. Bezdek,et al. Pattern Recognition with Fuzzy Objective Function Algorithms , 1981, Advanced Applications in Pattern Recognition.
[13] Christophe Rosenberger,et al. Keystroke dynamics with low constraints SVM based passphrase enrollment , 2009, 2009 IEEE 3rd International Conference on Biometrics: Theory, Applications, and Systems.
[14] Xian Ke,et al. Typing patterns: a key to user identification , 2004, IEEE Security & Privacy Magazine.
[15] Nathan Clarke,et al. Deployment of Keystroke Analysis on a Smartphone , 2008 .
[16] Sungzoon Cho,et al. Keystroke dynamics-based authentication for mobile devices , 2009, Comput. Secur..
[17] Yanggon Kim,et al. Pupil and Iris Localization for Iris Recognition in Mobile Phones , 2006, Seventh ACIS International Conference on Software Engineering, Artificial Intelligence, Networking, and Parallel/Distributed Computing (SNPD'06).
[18] Steven Furnell,et al. Keystroke dynamics on a mobile handset: a feasibility study , 2003, Inf. Manag. Comput. Secur..
[19] P. Suganthi,et al. Mobile Phones Security Using Biometrics , 2007, International Conference on Computational Intelligence and Multimedia Applications (ICCIMA 2007).
[20] Lee Luan Ling,et al. Biometric Access Control Through Numerical Keyboards Based on Keystroke Dynamics , 2006, ICB.
[21] Heather Crawford. Keystroke dynamics: Characteristics and opportunities , 2010, 2010 Eighth International Conference on Privacy, Security and Trust.
[22] Steven Furnell,et al. Authenticating mobile phone users using keystroke analysis , 2006, International Journal of Information Security.
[23] Arun Ross,et al. Biometric template selection and update: a case study in fingerprints , 2004, Pattern Recognit..
[24] Fabian Monrose,et al. Keystroke dynamics as a biometric for authentication , 2000, Future Gener. Comput. Syst..
[25] Loris Nanni,et al. A clustering method for automatic biometric template selection , 2006, Pattern Recognit..
[26] Sabah Jassim,et al. SecurePhone: a mobile phone with biometric authentication and e-signature support for dealing secure transactions on the fly , 2006, SPIE Defense + Commercial Sensing.
[27] Mohammad S. Obaidat,et al. Verification of computer users using keystroke dynamics , 1997, IEEE Trans. Syst. Man Cybern. Part B.
[28] P. Bhattarakosol,et al. Authenticating User Using Keystroke Dynamics and Finger Pressure , 2009, 2009 6th IEEE Consumer Communications and Networking Conference.
[29] Berrin A. Yanikoglu,et al. Identity authentication using improved online signature verification method , 2005, Pattern Recognit. Lett..