A Biometric Approach for Continuous User Authentication by Fusing Hard and Soft Traits
暂无分享,去创建一个
[1] Matti Pietikäinen,et al. Face Recognition by Exploring Information Jointly in Space, Scale and Orientation , 2011, IEEE Transactions on Image Processing.
[2] Siraj Ahmed Shaikh,et al. A Biometric Authentication Protocol for 3G Mobile Systems: Modelled and Validated Using CSP and Rank Functions , 2007, Int. J. Netw. Secur..
[3] Mingwu Zhang,et al. Multibiometric Based Secure Encryption, Authentication Scheme with Fuzzy Extractor , 2011, Int. J. Netw. Secur..
[4] Dorin Comaniciu,et al. Mean Shift: A Robust Approach Toward Feature Space Analysis , 2002, IEEE Trans. Pattern Anal. Mach. Intell..
[5] Shanq-Jang Ruan,et al. A Simple and Accurate Color Face Detection Algorithm in Complex Background , 2006, 2006 IEEE International Conference on Multimedia and Expo.
[6] Stanislav Kurkovsky,et al. Approaches and Issues in Location-Aware Continuous Authentication , 2010, 2010 13th IEEE International Conference on Computational Science and Engineering.
[7] Vijayan K. Asari,et al. Face detection technique based on intensity and skin color distribution , 2004, 2004 International Conference on Image Processing, 2004. ICIP '04..
[8] Anil K. Jain,et al. Soft Biometric Traits for Continuous User Authentication , 2010, IEEE Transactions on Information Forensics and Security.
[9] Graça Bressan,et al. A Continuous Authentication System Based on User Behavior Analysis , 2010, 2010 International Conference on Availability, Reliability and Security.
[10] Stan Z. Li,et al. Face Recognition with Local Gabor Textons , 2007, ICB.
[11] Wen Gao,et al. Local Gabor binary pattern histogram sequence (LGBPHS): a novel non-statistical model for face representation and recognition , 2005, Tenth IEEE International Conference on Computer Vision (ICCV'05) Volume 1.
[12] M. R. Spiegel. E and M , 1981 .
[13] Azad M. Madni,et al. Leveraging Biometrics for User Authentication in Online Learning: A Systems Perspective , 2009, IEEE Systems Journal.
[14] Min-Shiang Hwang,et al. A modified remote user authentication scheme using smart cards , 2003, IEEE Trans. Consumer Electron..
[15] Arslan Brömme,et al. A Risk Analysis Approach for Biometric Authentication Technology , 2006, Int. J. Netw. Secur..
[16] Sandeep Kumar,et al. Using continuous biometric verification to protect interactive login sessions , 2005, 21st Annual Computer Security Applications Conference (ACSAC'05).
[17] G. Jaffré,et al. Costume: a new feature for automatic video content indexing , 2004 .
[18] Matti Pietikäinen,et al. Face Description with Local Binary Patterns: Application to Face Recognition , 2006, IEEE Transactions on Pattern Analysis and Machine Intelligence.
[19] Cheng-Chi Lee,et al. Security Enhancement on a New Authentication Scheme With Anonymity for Wireless Environments , 2006, IEEE Transactions on Industrial Electronics.
[20] Cheng-Chi Lee,et al. A password authentication scheme over insecure networks , 2006, J. Comput. Syst. Sci..
[21] Peter Xiaoping Liu,et al. Structural Results for Combined Continuous User Authentication and Intrusion Detection in High Security Mobile Ad-Hoc Networks , 2011, IEEE Transactions on Wireless Communications.
[22] Colin Boyd,et al. User-representative feature selection for keystroke dynamics , 2011, 2011 5th International Conference on Network and System Security.
[23] Yu Xiuyuan. A Modified Remote User Authentication Scheme Using Smart Cards , 2008 .