Approaches and Issues in Location-Aware Continuous Authentication
暂无分享,去创建一个
[1] Anil K. Jain,et al. Soft Biometric Traits for Continuous User Authentication , 2010, IEEE Transactions on Information Forensics and Security.
[2] John Leubsdorf,et al. Privacy and Freedom , 1968 .
[3] Jakob E. Bardram,et al. Context-Aware User Authentication - Supporting Proximity-Based Login in Pervasive Computing , 2003, UbiComp.
[4] Abdulmotaleb El-Saddik,et al. Haptic-Based Biometrics: A Feasibility Study , 2006, 2006 14th Symposium on Haptic Interfaces for Virtual Environment and Teleoperator Systems.
[5] Elisa Bertino,et al. Location-Aware Authentication and Access Control Concepts and Issues , 2009, 2009 International Conference on Advanced Information Networking and Applications.
[6] Stanislav Kurkovsky,et al. Continuous RFID-enabled authentication and its privacy implications , 2010, 2010 IEEE International Symposium on Technology and Society.
[7] Victor Lee. Biometrics and identity fraud , 2008 .
[8] Seppo Puuronen,et al. Using continuous user authentication to detect masqueraders , 2003, Inf. Manag. Comput. Secur..
[9] Roberto Sassi,et al. A fuzzy approach to multimodal biometric continuous authentication , 2008, Fuzzy Optim. Decis. Mak..
[10] Ravi S. Sandhu,et al. Role-Based Access Control Models , 1996, Computer.
[11] Indrakshi Ray,et al. LRBAC: A Location-Aware Role-Based Access Control Model , 2006, ICISS.
[12] S. Furnell,et al. Public awareness and perceptions of biometrics , 2007 .
[13] Lars Kulik,et al. Location privacy and location-aware computing , 2006 .
[14] Akhilesh Chandra,et al. Modeling an intelligent continuous authentication system to protect financial information resources , 2006, Int. J. Account. Inf. Syst..
[15] Sandeep Kumar,et al. Continuous Verification Using Multimodal Biometrics , 2007, IEEE Trans. Pattern Anal. Mach. Intell..
[16] Tim Parker. Are We Protected? The Adequacy of Existing Legal Frameworks for Protecting Privacy in the Biometric Age , 2010, ICEB.
[17] Dorothy E. Denning,et al. Location-based authentication: Grounding cyberspace for better security , 1996 .
[18] John Krumm,et al. A survey of computational location privacy , 2009, Personal and Ubiquitous Computing.
[19] Ali Dehghantanha,et al. A Review of Vulnerabilities in Identity Management Using Biometrics , 2010, 2010 Second International Conference on Future Networks.
[20] David J. Danelski,et al. Privacy and Freedom , 1968 .
[21] Frank Stajano,et al. Location Privacy in Pervasive Computing , 2003, IEEE Pervasive Comput..
[22] Elisa Bertino,et al. GEO-RBAC: a spatially aware RBAC , 2005, SACMAT '05.
[23] Dimitrios Tzovaras,et al. Unobtrusive Multimodal Biometric Authentication: The HUMABIO Project Concept , 2008, EURASIP J. Adv. Signal Process..
[24] Graça Bressan,et al. A Continuous Authentication System Based on User Behavior Analysis , 2010, 2010 International Conference on Availability, Reliability and Security.