Fingerprint Recognition on Mobile Devices: Widely Deployed, Rarely Understood
暂无分享,去创建一个
[1] Christoph Busch,et al. Social acceptance of biometric technologies in Germany: A survey , 2013, 2013 International Conference of the BIOSIG Special Interest Group (BIOSIG).
[2] Verena Zimmermann,et al. "If It Wasn't Secure, They Would Not Use It in the Movies" - Security Perceptions and User Acceptance of Authentication Technologies , 2017, HCI.
[3] M. García-Pérez,et al. Cellwise Residual Analysis in Two-Way Contingency Tables , 2003 .
[4] Emmanuel Bello-Ogunu,et al. Investigating User Comprehension and Risk Perception of Apple's Touch ID Technology , 2017, ARES.
[5] Blase Ur,et al. Biometric authentication on iPhone and Android: Usability, perceptions, and influences on adoption , 2015 .
[6] Serge Egelman,et al. The Anatomy of Smartphone Unlocking: A Field Study of Android Lock Screens , 2016, CHI.
[7] E. Higgs. Fingerprints and Citizenship: The British State and the Identification of Pensioners in the Interwar Period , 2010, History workshop journal : HWJ.
[8] M. Angela Sasse,et al. Obstacles to the Adoption of Secure Communication Tools , 2017, 2017 IEEE Symposium on Security and Privacy (SP).
[9] Serge Egelman,et al. Keep on Lockin' in the Free World: A Multi-National Comparison of Smartphone Locking , 2016, CHI.
[10] Lorie M. Liebrock,et al. Using Fingerprint Authentication to Reduce System Security: An Empirical Study , 2011, 2011 IEEE Symposium on Security and Privacy.
[11] Richard Green,et al. Fingerprint asymmetry in male and female transsexuals , 2000 .
[12] D. Kimura,et al. DERMATOGLYPHIC ASYMMETRY : RELATION TO SEX, HANDEDNESS AND COGNITIVE PATTERN , 1995 .
[13] Heinrich Hußmann,et al. I Feel Like I'm Taking Selfies All Day!: Towards Understanding Biometric Authentication on Smartphones , 2015, CHI.
[14] J. Halámek,et al. Forensic Identification of Gender from Fingerprints. , 2015, Analytical chemistry.
[15] Bernd Zwattendorfer,et al. CREDENTIAL: A Framework for Privacy-Preserving Cloud-Based Data Sharing , 2016, 2016 11th International Conference on Availability, Reliability and Security (ARES).
[16] Els Kindt. The Use of Privacy Enhancing Technologies for Biometric Systems Analysed from a Legal Perspective , 2009, PrimeLife.
[17] John Sören Pettersson,et al. User Evaluations of an App Interface for Cloud-Based Identity Management , 2018 .
[18] Konstantin Beznosov,et al. On the Impact of Touch ID on iPhone Passcodes , 2015, SOUPS.
[19] Els Kindt. Biometric Data, Data Protection and the Right to Privacy , 2013 .
[20] T. Mark Beasley,et al. Multiple Regression Approach to Analyzing Contingency Tables: Post Hoc and Planned Comparison Procedures. , 1995 .
[21] 吉田 則裕,et al. Android Open Source Projectを対象としたパッチレビュー活動の調査 , 2012 .
[22] Andreas Pfitzmann. Biometrics - How to Put to Use and How Not at All? , 2008, TrustBus.
[23] Walid Maalej,et al. A survey about user requirements for biometric authentication on smartphones , 2015, 2015 IEEE 2nd Workshop on Evolving Security and Privacy Requirements Engineering (ESPRE).