User Interaction in Mobile Biometrics
暂无分享,去创建一个
[1] Norman Sadeh,et al. Smartphone Fingerprint Authentication versus PINs: A Usability Study (CMU-CyLab-14-012) , 2014 .
[2] Raul Sánchez-Reillo,et al. Accessibility evaluation of a mobile biometric recognition system , 2016, 2016 IEEE International Conference on Identity, Security and Behavior Analysis (ISBA).
[3] Raul Sanchez-Reillo,et al. Usability analysis of a handwritten signature recognition system applied to mobile scenarios , 2013, 2013 47th International Carnahan Conference on Security Technology (ICCST).
[4] Guest Richard,et al. Interaction evaluation of a mobile voice authentication system , 2016 .
[5] Richard M. Guest,et al. Voice and face interaction evaluation of a mobile authentication platform , 2017, 2017 International Carnahan Conference on Security Technology (ICCST).
[6] Judith Liu-Jimenez,et al. How to assess user interaction effects in Biometric performance , 2017, 2017 IEEE International Conference on Identity, Security and Behavior Analysis (ISBA).
[7] Ramón Blanco-Gonzalo,et al. Usability evaluation of biometrics in mobile environments , 2013, 2013 6th International Conference on Human System Interactions (HSI).
[8] Blase Ur,et al. Biometric authentication on iPhone and Android: Usability, perceptions, and influences on adoption , 2015 .
[9] Raul Sánchez-Reillo,et al. Automatic usability and stress analysis in mobile biometrics , 2014, Image Vis. Comput..
[10] Heinrich Hußmann,et al. Easy to Draw, but Hard to Trace?: On the Observability of Grid-based (Un)lock Patterns , 2015, CHI.
[11] Stephen J. Elliott,et al. The Human–Biometric-Sensor Interaction Evaluation Method: Biometric Performance and Usability Measurements , 2010, IEEE Transactions on Instrumentation and Measurement.
[12] Vincenzo Conti,et al. Usability Analysis of a Novel Biometric Authentication Approach for Android-Based Mobile Devices , 2014, Journal of Telecommunications and Information Technology.
[13] Raul Sanchez-Reillo,et al. Universal access through biometrics in mobile scenarios , 2013, 2013 47th International Carnahan Conference on Security Technology (ICCST).