A Novel Non-intrusive User Authentication Method Based on Touchscreen of Smartphones
暂无分享,去创建一个
[1] Hsing-Kuo Kenneth Pao,et al. Game bot identification based on manifold learning , 2008, NETGAMES.
[2] Mohammad Najmud Doja,et al. USER AUTHENTICATION SCHEMES FOR MOBILE AND HANDHELD DEVICES , 2008 .
[3] L. O'Gorman,et al. Comparing passwords, tokens, and biometrics for user authentication , 2003, Proceedings of the IEEE.
[4] Steven Furnell,et al. Authenticating mobile phone users using keystroke analysis , 2006, International Journal of Information Security.
[5] Dexin Zhang,et al. DCT-Based Iris Recognition , 2007, IEEE Transactions on Pattern Analysis and Machine Intelligence.
[6] Tao Feng,et al. Continuous mobile authentication using touchscreen gestures , 2012, 2012 IEEE Conference on Technologies for Homeland Security (HST).
[7] Jie Yang,et al. Sweep fingerprint sequence reconstruction for portable devices , 2006 .
[8] S.Benson Edwin Raj,et al. A Behavioral Biometric Approach Based on Standardized Resolution in Mouse Dynamics , 2009 .
[9] Steven Furnell,et al. Flexible and Transparent User Authentication for Mobile Devices , 2009, SEC.
[10] A. Ant Ozok,et al. A comparison of perceived and real shoulder-surfing risks between alphanumeric and graphical passwords , 2006, SOUPS '06.
[11] Anil K. Jain,et al. FVC2000: Fingerprint Verification Competition , 2002, IEEE Trans. Pattern Anal. Mach. Intell..
[12] Berrin A. Yanikoglu,et al. Identity authentication using improved online signature verification method , 2005, Pattern Recognit. Lett..
[13] Nalini K. Ratha,et al. Biometric perils and patches , 2002, Pattern Recognit..
[14] Hamid Jahankhani,et al. A Survey of User Authentication Based on Mouse Dynamics , 2008 .
[15] Deron Liang,et al. A New Non-intrusive Authentication Approach for Data Protection Based on Mouse Dynamics , 2012, 2012 International Symposium on Biometrics and Security Technologies.
[16] Ahmed Awad E. Ahmed,et al. A New Biometric Technology Based on Mouse Dynamics , 2007, IEEE Transactions on Dependable and Secure Computing.
[17] Ana L. N. Fred,et al. A User Authentication Technic Using a~Web Interaction Monitoring System , 2003, IbPRIA.
[18] Heikki Ailisto,et al. Increasing Security of Mobile Devices by Decreasing User Effort in Verification , 2007, 2007 Second International Conference on Systems and Networks Communications (ICSNC 2007).
[19] Dugald Ralph Hutchings,et al. Order and entropy in picture passwords , 2008, Graphics Interface.
[20] Jun Yang,et al. SenGuard: Passive user identification on smartphones using multiple sensors , 2011, 2011 IEEE 7th International Conference on Wireless and Mobile Computing, Networking and Communications (WiMob).
[21] Jouni Markkula,et al. An integrated identity verification system for mobile terminals , 2005, Inf. Manag. Comput. Security.
[22] Kirsi Helkala,et al. Biometric Gait Authentication Using Accelerometer Sensor , 2006, J. Comput..
[23] R. Tibshirani,et al. Improvements on Cross-Validation: The 632+ Bootstrap Method , 1997 .
[24] Volker Roth,et al. A PIN-entry method resilient against shoulder surfing , 2004, CCS '04.
[25] Steven Furnell,et al. Beyond the PIN: Enhancing user authentication for mobile devices , 2008 .
[26] Douglas A. Reynolds,et al. SHEEP, GOATS, LAMBS and WOLVES A Statistical Analysis of Speaker Performance in the NIST 1998 Speaker Recognition Evaluation , 1998 .
[27] Claudia Picardi,et al. User authentication through keystroke dynamics , 2002, TSEC.
[28] Patrick Bours,et al. Improved Cycle Detection for Accelerometer Based Gait Authentication , 2010, 2010 Sixth International Conference on Intelligent Information Hiding and Multimedia Signal Processing.
[29] Alain Forget,et al. Shoulder-surfing resistance with eye-gaze entry in cued-recall graphical passwords , 2010, CHI.
[30] Kuanquan Wang,et al. Palmprint Texture Analysis Using Derivative of Gaussian Filters , 2006, 2006 International Conference on Computational Intelligence and Security.