Verification of Keyboard Acoustics Authentication on Laptops and Smartphones Using WebRTC
暂无分享,去创建一个
Christoph Meinel | Christian Tietz | Eric Klieme | Lukas Behrendt | Pawel Böning | Leonard Marschke | C. Meinel | Eric Klieme | C. Tietz | Leonard Marschke | Pawel Böning | Lukas Behrendt
[1] S. J. Shepherd. Continuous authentication by analysis of keyboard typing characteristics , 1995 .
[2] Mohammad S. Obaidat,et al. Verification of computer users using keystroke dynamics , 1997, IEEE Trans. Syst. Man Cybern. Part B.
[3] Steven Furnell,et al. Multi-modal Behavioural Biometric Authentication for Mobile Devices , 2012, SEC.
[4] Christine L. MacKenzie,et al. Computer user verification using login string keystroke dynamics , 1998, IEEE Trans. Syst. Man Cybern. Part A.
[5] Jozef Juhar,et al. Acoustical User Identification Based on MFCC Analysis of Keystrokes , 2015 .
[6] Bruno Crispo,et al. Mobile biometrics: Towards a comprehensive evaluation methodology , 2017, 2017 International Carnahan Conference on Security Technology (ICCST).
[7] Eva Kiktova,et al. Acoustical keystroke analysis for user identification and authentication , 2016, 2016 26th International Conference Radioelektronika (RADIOELEKTRONIKA).
[8] Patrick Bours,et al. Improving static audio keystroke analysis by score fusion of acoustic and timing data , 2017, Multimedia Tools and Applications.
[9] Christoph Busch,et al. Unobtrusive User-Authentication on Mobile Phones Using Biometric Gait Recognition , 2010, 2010 Sixth International Conference on Intelligent Information Hiding and Multimedia Signal Processing.
[10] Anil K. Jain,et al. An Introduction to Biometric Authentication Systems , 2005 .
[11] Brianna S Fjeldsoe,et al. Reducing sitting time in office workers: short-term efficacy of a multicomponent intervention. , 2013, Preventive medicine.
[12] Steven Furnell,et al. A Long-term Trial of Keystroke Profiling using Digraph, Trigraph and Keyword Latencies , 2004, SEC.
[13] Anil K. Jain,et al. Continuous user authentication using temporal information , 2010, Defense + Commercial Sensing.
[14] Mauro Conti,et al. Don't Skype & Type!: Acoustic Eavesdropping in Voice-Over-IP , 2016, AsiaCCS.
[15] George D. C. Cavalcanti,et al. Hybrid Solution for the Feature Selection in Personal Identification Problems through Keystroke Dynamics , 2007, 2007 International Joint Conference on Neural Networks.
[16] Paul Johns,et al. Working Overtime: Patterns of Smartphone and PC Usage in the Day of an Information Worker , 2009, Pervasive.
[17] Arun Ross,et al. Biometric authentication via keystroke sound , 2013, 2013 International Conference on Biometrics (ICB).
[18] Damon L. Woodard,et al. Biometric Authentication and Identification using Keystroke Dynamics: A Survey , 2012 .
[19] Elena N. Zaitseva,et al. A Review of Continuous Authentication Using Behavioral Biometrics , 2016, SEEDA-CECNSM '16.
[20] A. Kelly. Cracking Passwords using Keyboard Acoustics and Language Modeling , 2010 .
[21] Claudia Picardi,et al. User authentication through keystroke dynamics , 2002, TSEC.
[22] Feng Zhou,et al. Keyboard acoustic emanations revisited , 2005, CCS '05.
[23] David Umphress,et al. Identity Verification Through Keyboard Characteristics , 1985, Int. J. Man Mach. Stud..
[24] Arun Ross,et al. Investigating the Discriminative Power of Keystroke Sound , 2015, IEEE Transactions on Information Forensics and Security.
[25] Bruno Crispo,et al. ITSME: Multi-modal and Unobtrusive Behavioural User Authentication for Smartphones , 2015, PASSWORDS.
[26] Christoph Meinel,et al. Beware of SMOMBIES: Verification of Users Based on Activities While Walking , 2018, 2018 17th IEEE International Conference On Trust, Security And Privacy In Computing And Communications/ 12th IEEE International Conference On Big Data Science And Engineering (TrustCom/BigDataSE).
[27] Kenneth Revett,et al. A machine learning approach to keystroke dynamics based user authentication , 2007, Int. J. Electron. Secur. Digit. Forensics.
[28] Sungzoon Cho,et al. Keystroke dynamics identity verification - its problems and practical solutions , 2004, Comput. Secur..
[29] Rakesh Agrawal,et al. Keyboard acoustic emanations , 2004, IEEE Symposium on Security and Privacy, 2004. Proceedings. 2004.
[30] Michal Choras,et al. Recognizing Individual Typing Patterns , 2007, IbPRIA.