Wave to me: user identification using body lengths and natural gestures
暂无分享,去创建一个
[1] Doris Hausen,et al. BroAuth: evaluating different levels of visual feedback for 3D gesture-based authentication , 2012, AVI.
[2] Lorrie Faith Cranor,et al. Security and Usability: Designing Secure Systems that People Can Use , 2005 .
[3] Sébastien Marcel,et al. A novel statistical generative model dedicated to face recognition , 2010, Image Vis. Comput..
[4] Simone Wannemaker. Security And Usability Designing Secure Systems That People Can Use , 2016 .
[5] Heikki Ailisto,et al. Identifying users of portable devices from gait pattern with accelerometers , 2005, Proceedings. (ICASSP '05). IEEE International Conference on Acoustics, Speech, and Signal Processing, 2005..
[6] E. N. Corlett,et al. The Ergonomics Of Workspaces And Machines: A Design Manual , 1984 .
[7] Anil K. Jain,et al. Large-scale evaluation of multimodal biometric authentication using state-of-the-art systems , 2005, IEEE Transactions on Pattern Analysis and Machine Intelligence.
[8] Rene Mayrhofer,et al. Shake well before use: two implementations for implicit context authentication , 2007 .
[9] Arun Ross,et al. Score normalization in multimodal biometric systems , 2005, Pattern Recognit..
[10] Xian Ke,et al. Typing patterns: a key to user identification , 2004, IEEE Security & Privacy Magazine.
[11] Anil K. Jain,et al. Handbook of Fingerprint Recognition , 2005, Springer Professional Computing.
[12] Wenyuan Xu,et al. KinWrite: Handwriting-Based Authentication Using Kinect , 2013, NDSS.
[13] Dominik Schmidt,et al. HandsDown: hand-contour-based user identification for interactive surfaces , 2010, NordiCHI.
[14] Christine M. Haslegrave,et al. Bodyspace: Anthropometry, Ergonomics and the Design of Work, Third Edition , 2016 .
[15] René Mayrhofer,et al. Shake Well Before Use: Intuitive and Secure Pairing of Mobile Devices , 2009, IEEE Transactions on Mobile Computing.
[16] Janusz Konrad,et al. Towards Gesture-Based User Authentication , 2012, 2012 IEEE Ninth International Conference on Advanced Video and Signal-Based Surveillance.
[17] Davrondzhon Gafurov,et al. A Survey of Biometric Gait Recognition: Approaches, Security and Challenges , 2007 .
[18] Steve Renals,et al. Speaker verification using sequence discriminant support vector machines , 2005, IEEE Transactions on Speech and Audio Processing.
[19] Simson L. Garfinkel,et al. Security and Usability , 2005 .
[20] Gregory D. Abowd,et al. A gesture-based authentication scheme for untrusted public terminals , 2004, UIST '04.
[21] Lin Zhong,et al. User evaluation of lightweight user authentication with a single tri-axis accelerometer , 2009, Mobile HCI.
[22] Sharath Pankanti,et al. Biometrics: Personal Identification in Networked Society , 2013 .
[23] Baining Guo,et al. Kinect Identity: Technology and Experience , 2011, Computer.
[24] Nasir D. Memon,et al. Biometric-rich gestures: a novel approach to authentication on multi-touch devices , 2012, CHI.
[25] Stephan Konz,et al. The ergonomics of workspaces and machines: A design manual , 1997 .
[26] 中村 薫,et al. KINECT for Windows SDKプログラミング , 2012 .