Keystroke dynamics authentication for collaborative systems
暂无分享,去创建一个
[1] Alfred C. Weaver,et al. Biometric authentication , 2006, Computer.
[2] Christine L. MacKenzie,et al. Computer user verification using login string keystroke dynamics , 1998, IEEE Trans. Syst. Man Cybern. Part A.
[3] Sungzoon Cho,et al. Keystroke dynamics identity verification - its problems and practical solutions , 2004, Comput. Secur..
[4] Jarmo Ilonen. Keystroke Dynamics , 2009, Encyclopedia of Biometrics.
[5] Danoush Hosseinzadeh,et al. Gaussian Mixture Modeling of Keystroke Patterns for Biometric Applications , 2008, IEEE Transactions on Systems, Man, and Cybernetics, Part C (Applications and Reviews).
[6] Takashi Matsumoto,et al. Effectiveness of Pen Pressure, Azimuth, and Altitude Features for Online Signature Verification , 2007, ICB.
[7] Ibrahim Sogukpinar,et al. Understanding users' keystroke patterns for computer access security , 2003, Comput. Secur..
[8] Terence Sim,et al. Keystroke Dynamics in a General Setting , 2007, ICB.
[9] Bir Bhanu,et al. Individual recognition using gait energy image , 2006, IEEE Transactions on Pattern Analysis and Machine Intelligence.
[10] Geoffrey C. Fox,et al. A collaborative framework for scientific data analysis and visualization , 2008, 2008 International Symposium on Collaborative Technologies and Systems.
[11] Hyoungjoo Lee,et al. Improving Authentication Accuracy of Unfamiliar Passwords with Pauses and Cues for Keystroke Dynamics-Based Authentication , 2006, WISI.
[12] Lee Luan Ling,et al. Biometric Access Control Through Numerical Keyboards Based on Keystroke Dynamics , 2006, ICB.
[13] Philip J. Sallis,et al. A system architecture for collaborative environmental modeling research , 2008, 2008 International Symposium on Collaborative Technologies and Systems.
[14] Jean-Yves Ramel,et al. User Classification for Keystroke Dynamics Authentication , 2007, ICB.
[15] Ying Zhao,et al. Learning User Keystroke Patterns for Authentication , 2008 .
[16] Andy Adler,et al. Comparing Human and Automatic Face Recognition Performance , 2007, IEEE Transactions on Systems, Man, and Cybernetics, Part B (Cybernetics).
[17] Kenneth Revett,et al. On the Use of Rough Sets for User Authentication Via Keystroke Dynamics , 2007, EPIA Workshops.
[18] David Umphress,et al. Identity Verification Through Keyboard Characteristics , 1985, Int. J. Man Mach. Stud..
[19] Claudia Picardi,et al. User authentication through keystroke dynamics , 2002, TSEC.
[20] Norman Shapiro,et al. Authentication by Keystroke Timing: Some Preliminary Results , 1980 .
[21] B. Hussien,et al. Computer-Access Security Systems Using Keystroke Dynamics , 1990, IEEE Trans. Pattern Anal. Mach. Intell..
[22] Jugurta R. Montalvão Filho,et al. On the equalization of keystroke timing histograms , 2006, Pattern Recognit. Lett..
[23] Fabian Monrose,et al. Authentication via keystroke dynamics , 1997, CCS '97.
[24] Mohammad S. Obaidat,et al. Verification of computer users using keystroke dynamics , 1997, IEEE Trans. Syst. Man Cybern. Part B.
[25] Steven Furnell,et al. Advanced user authentication for mobile devices , 2007, Comput. Secur..
[26] O. Coltell,et al. Biometric identification system based on keyboard filtering , 1999, Proceedings IEEE 33rd Annual 1999 International Carnahan Conference on Security Technology (Cat. No.99CH36303).