When my Behavior Enhances my Smartphone Security
暂无分享,去创建一个
Christophe Rosenberger | Takoua Guiga | Jean-Jacques Schwartzmann | C. Rosenberger | Jean-Jacques Schwartzmann | Takoua Guiga
[1] Rama Chellappa,et al. Sectored Random Projections for Cancelable Iris Biometrics , 2010, 2010 IEEE International Conference on Acoustics, Speech and Signal Processing.
[2] Steven Furnell,et al. Authenticating mobile phone users using keystroke analysis , 2006, International Journal of Information Security.
[3] Mansour Alsaleh,et al. Smartphone users: Understanding how security mechanisms are perceived and new persuasive methods , 2017, PloS one.
[4] Nathan L. Clarke. Transparent User Authentication - Biometrics, RFID and Behavioural Profiling , 2011 .
[5] Christophe Rosenberger,et al. Privacy Preserving Transparent Mobile Authentication , 2017, ICISSP.
[6] Nalini K. Ratha,et al. Enhancing security and privacy in biometrics-based authentication systems , 2001, IBM Syst. J..
[7] Rama Chellappa,et al. Cancelable Biometrics: A review , 2015, IEEE Signal Processing Magazine.
[8] Andrew Beng Jin Teoh,et al. Biohashing: two factor authentication featuring fingerprint data and tokenised random number , 2004, Pattern Recognit..
[9] Christoph Busch,et al. On application of bloom filters to iris biometrics , 2014, IET Biom..
[10] Christophe Rosenberger,et al. An Overview on Privacy Preserving Biometrics , 2011 .
[11] Gian Luca Foresti,et al. Biometric Liveness Detection: Challenges and Research Opportunities , 2015, IEEE Security & Privacy.
[12] W. Eric L. Grimson,et al. Gait analysis for recognition and classification , 2002, Proceedings of Fifth IEEE International Conference on Automatic Face Gesture Recognition.
[13] Mohammad Nauman,et al. Using trusted computing for privacy preserving keystroke-based authentication in smartphones , 2013, Telecommun. Syst..