Mouse tracking, behavioral biometrics, and GEFE
暂无分享,去创建一个
[1] Karl Ricanek,et al. Genetic & Evolutionary Biometric Security: Disposable Feature Extractors for Mitigating Biometric Replay Attacks , 2012, CSER.
[2] Gerry V. Dozier,et al. Permutation-based biometric authentication protocols for mitigating replay attacks , 2012, 2012 IEEE Congress on Evolutionary Computation.
[3] Ashok A. Ghatol,et al. Iris recognition: an emerging biometric technology , 2007 .
[4] J. A. Lozano,et al. Estimation of Distribution Algorithms: A New Tool for Evolutionary Computation , 2001 .
[5] Marios Savvides,et al. Minimizing the number of bits needed for iris recognition via Bit Inconsistency and GRIT , 2009, 2009 IEEE Workshop on Computational Intelligence in Biometrics: Theory, Algorithms, and Applications.
[6] Mingyue Li,et al. Security vulnerabilities of an remote password authentication scheme with smart card , 2011, 2011 International Conference on Consumer Electronics, Communications and Networks (CECNet).
[7] Hung-Yu Chien,et al. An Efficient and Practical Solution to Remote Authentication: Smart Card , 2002, Comput. Secur..
[8] Kenneth Revett. A Bioinformatics Based Approach to Behavioural Biometrics , 2007, 2007 Frontiers in the Convergence of Bioscience and Information Technologies.
[9] Anil K. Jain,et al. Handbook of Face Recognition, 2nd Edition , 2011 .
[10] Matti Pietikäinen,et al. Face Description with Local Binary Patterns: Application to Face Recognition , 2006, IEEE Transactions on Pattern Analysis and Machine Intelligence.
[11] Thomas Bäck,et al. Evolutionary computation: Toward a new philosophy of machine intelligence , 1997, Complex..
[12] Henry C. Lee,et al. Advances in Fingerprint Technology , 1991 .
[13] Damon L. Woodard,et al. Genetic based LBP feature extraction and selection for facial recognition , 2011, ACM-SE '11.
[14] A. Ant Ozok,et al. Perception and acceptance of fingerprint biometric technology , 2007, SOUPS '07.
[15] Ariel Rabkin,et al. Personal knowledge questions for fallback authentication: security questions in the era of Facebook , 2008, SOUPS '08.
[16] L. O'Gorman,et al. Comparing passwords, tokens, and biometrics for user authentication , 2003, Proceedings of the IEEE.
[17] Pedro Larrañaga,et al. Estimation of Distribution Algorithms , 2002, Genetic Algorithms and Evolutionary Computation.
[18] Azriel Rosenfeld,et al. Face recognition: A literature survey , 2003, CSUR.
[19] Venu Govindaraju,et al. Behavioural biometrics: a survey and classification , 2008, Int. J. Biom..
[20] Lawrence. Davis,et al. Handbook Of Genetic Algorithms , 1990 .
[21] Nenghai Yu,et al. A Security Enhanced Remote Password Authentication Scheme Using Smart Card , 2010, 2010 Second International Symposium on Data, Privacy, and E-Commerce.
[22] B. Miller,et al. Vital signs of identity [biometrics] , 1994, IEEE Spectrum.
[23] Sharath Pankanti,et al. BIOMETRIC IDENTIFICATION , 2000 .
[24] Matti Pietikäinen,et al. Multiresolution Gray-Scale and Rotation Invariant Texture Classification with Local Binary Patterns , 2002, IEEE Trans. Pattern Anal. Mach. Intell..