GREYC keystroke: A benchmark for keystroke dynamics biometric systems
暂无分享,去创建一个
[1] Hyeonjoon Moon,et al. The FERET evaluation methodology for face-recognition algorithms , 1997, Proceedings of IEEE Computer Society Conference on Computer Vision and Pattern Recognition.
[2] Christophe Rosenberger,et al. Keystroke dynamics authentication for collaborative systems , 2009, 2009 International Symposium on Collaborative Technologies and Systems.
[3] Liang Wang,et al. Behavioral Biometrics For Human Identification: Intelligent Applications , 2009 .
[4] Mary F. Theofanos,et al. Usability and Biometrics: Ensuring Successful Biometric Systems | NIST , 2008 .
[5] Alice J. O'Toole,et al. FRVT 2006 and ICE 2006 large-scale results , 2007 .
[6] Luís A. Alexandre,et al. UBIRIS: A Noisy Iris Image Database , 2005, ICIAP.
[7] Arun Ross,et al. Handbook of Biometrics , 2007 .
[8] Anil K. Jain,et al. FVC2004: Third Fingerprint Verification Competition , 2004, ICBA.
[9] Wm. Arthur Conklin,et al. Password-based authentication: a system perspective , 2004, 37th Annual Hawaii International Conference on System Sciences, 2004. Proceedings of the.
[10] Norman Shapiro,et al. Authentication by Keystroke Timing: Some Preliminary Results , 1980 .
[11] Sungzoon Cho,et al. Artificial Rhythms and Cues for Keystroke Dynamics Based Authentication , 2006, ICB.
[12] Jugurta R. Montalvão Filho,et al. On the equalization of keystroke timing histograms , 2006, Pattern Recognit. Lett..
[13] Danoush Hosseinzadeh,et al. Gaussian Mixture Modeling of Keystroke Patterns for Biometric Applications , 2008, IEEE Transactions on Systems, Man, and Cybernetics, Part C (Applications and Reviews).
[14] Sungzoon Cho,et al. Keystroke dynamics identity verification - its problems and practical solutions , 2004, Comput. Secur..
[15] Lee Luan Ling,et al. Biometric Access Control Through Numerical Keyboards Based on Keystroke Dynamics , 2006, ICB.
[16] Jean-Yves Ramel,et al. User Classification for Keystroke Dynamics Authentication , 2007, ICB.
[17] Jean-Philippe Thiran,et al. The BANCA Database and Evaluation Protocol , 2003, AVBPA.
[18] Jiri Matas,et al. XM2VTSDB: The Extended M2VTS Database , 1999 .
[19] Christophe Rosenberger,et al. Keystroke dynamics with low constraints SVM based passphrase enrollment , 2009, 2009 IEEE 3rd International Conference on Biometrics: Theory, Applications, and Systems.
[20] B. Hussien,et al. Computer-Access Security Systems Using Keystroke Dynamics , 1990, IEEE Trans. Pattern Anal. Mach. Intell..
[21] Dario Maio,et al. Synthetic fingerprint-database generation , 2002, Object recognition supported by user interaction for service robots.
[22] Mohammad S. Obaidat,et al. Verification of computer users using keystroke dynamics , 1997, IEEE Trans. Syst. Man Cybern. Part B.
[23] Kenneth Revett,et al. On the Use of Rough Sets for User Authentication Via Keystroke Dynamics , 2007, EPIA Workshops.