Human Aspects of Information Security, Privacy and Trust: 5th International Conference, HAS 2017, Held as Part of HCI International 2017, Vancouver, BC, Canada, July 9-14, 2017, Proceedings
暂无分享,去创建一个
Gerhard Goos | Juris Hartmanis | Theo Tryfonas | Jan van Leeuwen | J. Hartmanis | T. Tryfonas | G. Goos | J. Leeuwen
[1] Ping Yan,et al. Biometric Recognition Using 3D Ear Shape , 2007, IEEE Transactions on Pattern Analysis and Machine Intelligence.
[2] Fabio Roli,et al. Fusion of multiple clues for photo-attack detection in face recognition systems , 2011, 2011 International Joint Conference on Biometrics (IJCB).
[3] Kathy Buckner,et al. Culture & biometrics: regional differences in the perception of biometric authentication technologies , 2009, AI & SOCIETY.
[4] Shujun Li,et al. Breaking undercover: exploiting design flaws and nonuniform human behavior , 2011, SOUPS.
[5] M. Turk,et al. Eigenfaces for Recognition , 1991, Journal of Cognitive Neuroscience.
[6] Richard M. Guest,et al. Predicting sex as a soft-biometrics from device interaction swipe gestures , 2016, Pattern Recognit. Lett..
[7] Gary M. Weiss,et al. Activity recognition using cell phone accelerometers , 2011, SKDD.
[8] Tieniu Tan,et al. Live face detection based on the analysis of Fourier spectra , 2004, SPIE Defense + Commercial Sensing.
[9] Jun Han,et al. ACCessory: password inference using accelerometers on smartphones , 2012, HotMobile '12.
[10] Rick Wash,et al. Understanding Password Choices: How Frequently Entered Passwords Are Re-used across Websites , 2016, SOUPS.
[11] Rana Tassabehji,et al. Improving E-Banking Security with Biometrics: Modelling User Attitudes and Acceptance , 2009, 2009 3rd International Conference on New Technologies, Mobility and Security.
[12] Kenichi Yamazaki,et al. Gait analyzer based on a cell phone with a single three-axis accelerometer , 2006, Mobile HCI.
[13] Dario D. Salvucci. Predicting the effects of in-car interfaces on driver behavior using a cognitive architecture , 2001, CHI.
[14] Josef Bigün,et al. Real-Time Face Detection and Motion Analysis With Application in “Liveness” Assessment , 2007, IEEE Transactions on Information Forensics and Security.
[15] Daisuke Miyamoto,et al. Eye Can Tell: On the Correlation Between Eye Movement and Phishing Identification , 2015, ICONIP.
[16] Timothy F. Cootes,et al. An Automatic Face Identification System Using Flexible Appearance Models , 1994, BMVC.
[17] Shari Trewin,et al. Biometric authentication on a mobile device: a study of user effort, error and task disruption , 2012, ACSAC '12.
[18] Lin Sun,et al. Eyeblink-based Anti-Spoofing in Face Recognition from a Generic Webcamera , 2007, 2007 IEEE 11th International Conference on Computer Vision.
[19] Hao Chen,et al. TouchLogger: Inferring Keystrokes on Touch Screen from Smartphone Motion , 2011, HotSec.
[20] Luis A. Hernández Gómez,et al. Usability evaluation of multi-modal biometric verification systems , 2006, Interact. Comput..
[21] R. Sun,et al. The interaction of the explicit and the implicit in skill learning: a dual-process approach. , 2005, Psychological review.
[22] Jerome H. Saltzer,et al. Kerberos authentication and authorization system , 1987 .
[23] Paul Jones,et al. Secrets and Lies: Digital Security in a Networked World , 2002 .
[24] Hong Li,et al. A liveness detection method for face recognition based on optical flow field , 2009, 2009 International Conference on Image Analysis and Signal Processing.
[25] Rajesh P. N. Rao,et al. Eye movements in iconic visual search , 2002, Vision Research.
[26] Matti Pietikäinen,et al. Face Description with Local Binary Patterns: Application to Face Recognition , 2006, IEEE Transactions on Pattern Analysis and Machine Intelligence.
[27] Sebastian Möller,et al. Gender differences in the perception of security of mobile phones , 2012, Mobile HCI.
[28] Nicolas Christin,et al. Undercover: authentication usable in front of prying eyes , 2008, CHI.
[29] Elizabeth Stobert,et al. Memory retrieval and graphical passwords , 2013, SOUPS.
[30] John E. Laird,et al. The Soar Cognitive Architecture , 2012 .
[31] A. Ant Ozok,et al. A comparison of perceived and real shoulder-surfing risks between alphanumeric and graphical passwords , 2006, SOUPS '06.
[32] Celeste Lyn Paul,et al. A Field Study of User Behavior and Perceptions in Smartcard Authentication , 2011, INTERACT.
[33] Matti Pietikäinen,et al. Face spoofing detection from single images using micro-texture analysis , 2011, 2011 International Joint Conference on Biometrics (IJCB).
[34] Alexander De Luca,et al. PassShapes: utilizing stroke based authentication to increase password memorability , 2008, NordiCHI.
[35] Jennifer A. Safar,et al. The Effects of use on Acceptance and Trust in Voice Authentication Technology , 2006 .
[36] Hua Yu,et al. A direct LDA algorithm for high-dimensional data - with application to face recognition , 2001, Pattern Recognit..
[37] Jan Palczewski,et al. Monte Carlo Simulation , 2008, Encyclopedia of GIS.
[38] L. O'Gorman,et al. Comparing passwords, tokens, and biometrics for user authentication , 2003, Proceedings of the IEEE.
[39] Ákos Frohner,et al. VOMS, an Authorization System for Virtual Organizations , 2003, European Across Grids Conference.
[40] Heinrich Hußmann,et al. Making graphic-based authentication secure against smudge attacks , 2013, IUI '13.
[41] Yasser M. Hausawi,et al. Secure, Usable Biometric Authentication Systems , 2013, HCI.
[42] Josef Bigün,et al. Evaluating liveness by face images and the structure tensor , 2005, Fourth IEEE Workshop on Automatic Identification Advanced Technologies (AutoID'05).
[43] Seongbeak Yoon,et al. Masked fake face detection using radiance measurements. , 2009, Journal of the Optical Society of America. A, Optics, image science, and vision.
[44] Ma Sasse,et al. Usability and Trust in Information Systems , 2005 .
[45] Chris Bevan,et al. Different strokes for different folks? Revealing the physical characteristics of smartphone users from their swipe gestures , 2016, Int. J. Hum. Comput. Stud..
[46] D. Scheuermann,et al. Usability of Biometrics in Relation to Electronic Signatures , 2000 .
[47] Kat Krol,et al. The Great Authentication Fatigue - And How to Overcome It , 2014, HCI.