Authentication via keystroke dynamics
暂无分享,去创建一个
[1] Richard O. Duda,et al. Pattern classification and scene analysis , 1974, A Wiley-Interscience publication.
[2] Julius T. Tou,et al. Pattern Recognition Principles , 1974 .
[3] John K. Dixon,et al. Pattern Recognition with Partly Missing Data , 1979, IEEE Transactions on Systems, Man, and Cybernetics.
[4] Norman Shapiro,et al. Authentication by Keystroke Timing: Some Preliminary Results , 1980 .
[5] M. K. Khan,et al. Machine identification of human faces , 1981, Pattern Recognition.
[6] David Umphress,et al. Identity Verification Through Keyboard Characteristics , 1985, Int. J. Man Mach. Stud..
[7] B. Clifford Neuman,et al. Kerberos: An Authentication Service for Open Network Systems , 1988, USENIX Winter.
[8] John J. Leggett,et al. Verifying Identity via Keystroke Characteristics , 1988, Int. J. Man Mach. Stud..
[9] Bassam Hussien,et al. An application of fuzzy algorithms in a computer access security system , 1989, Pattern Recognit. Lett..
[10] Gopal K. Gupta,et al. Identity authentication based on keystroke latencies , 1990, Commun. ACM.
[11] B. Hussien,et al. Computer-Access Security Systems Using Keystroke Dynamics , 1990, IEEE Trans. Pattern Anal. Mach. Intell..
[12] John J. Leggett,et al. Dynamic Identity Verification via Keystroke Characteristics , 1991, Int. J. Man Mach. Stud..
[13] William H. Press,et al. Numerical Recipes in C, 2nd Edition , 1992 .
[14] Marcus Brown,et al. User Identification via Keystroke Characteristics of Typed Names using Neural Networks , 1993, Int. J. Man Mach. Stud..
[15] John Daugman,et al. High Confidence Visual Recognition of Persons by a Test of Statistical Independence , 1993, IEEE Trans. Pattern Anal. Mach. Intell..
[16] B. Miller,et al. Vital signs of identity [biometrics] , 1994, IEEE Spectrum.
[17] Philip R. Zimmermann,et al. The official PGP user's guide , 1996 .
[18] Thomas J. Alexandre,et al. Biometrics on smart cards: An approach to keyboard behavioral signature , 1997, Future Gener. Comput. Syst..