Model for adaptable context-based biometric authentication for mobile devices
暂无分享,去创建一个
[1] Chuan Qin,et al. Progressive Authentication: Deciding When to Authenticate on Mobile Phones , 2012, USENIX Security Symposium.
[2] Wolfgang Leister,et al. A Novel Authentication Framework Based on Biometric and Radio Fingerprinting for the IoT in eHealth , 2014 .
[3] R. Pearl. Biometrics , 1914, The American Naturalist.
[4] Anil K. Jain,et al. Soft Biometric Traits for Continuous User Authentication , 2010, IEEE Transactions on Information Forensics and Security.
[5] Alan Goode. Bring your own finger – how mobile is bringing biometrics to consumers , 2014 .
[6] Ian Oakley,et al. CASA: context-aware scalable authentication , 2013, SOUPS.
[7] Gabriele Lenzini,et al. Contextual Biometric-Based Authentication for Ubiquitous Services , 2010, UIC.
[8] Stefan Poslad,et al. An Evaluation Framework for Adaptive Security for the IoT in eHealth , 2014 .
[9] Stan Sclaroff,et al. Image-based Ear Biometric Smartphone App for Patient Identification in Field Settings , 2015, VISAPP.
[10] Bachar El-Hassan,et al. Towards a Context Aware Modeling of Trust and Access Control Based on the User Behavior and Capabilities , 2013, ICOST.
[11] Mita Nasipuri,et al. Thermal Infrared Face Recognition – A Biometric Identification Technique for Robust Security system , 2011 .
[12] Tao Feng,et al. Continuous mobile authentication using touchscreen gestures , 2012, 2012 IEEE Conference on Technologies for Homeland Security (HST).
[13] Christoph Busch,et al. Context-Aware Mobile Biometric Authentication based on Support Vector Machines , 2013, 2013 Fourth International Conference on Emerging Security Technologies.
[14] Andrea F. Abate,et al. 2D and 3D face recognition: A survey , 2007, Pattern Recognit. Lett..
[15] Ivan Poupyrev,et al. Capacitive fingerprinting: exploring user differentiation by sensing electrical properties of the human body , 2012, UIST '12.
[16] Jakob E. Bardram,et al. Context-Aware User Authentication - Supporting Proximity-Based Login in Pervasive Computing , 2003, UbiComp.
[17] Sri Sairam. A REVIEW ON CONTINUOUS AUTHENTICATION USING MULTIMODAL BIOMETRICS , 2013 .
[18] Hemant Vallabh. Authentication using finger-vein recognition , 2013 .
[19] A REVIEW ON CONTINUOUS AUTHENTICATION USING MULTIMODAL BIOMETRICS , 2013 .
[20] Asaf Varol,et al. Android based mobile application development for web login authentication using fingerprint recognition feature , 2015, 2015 23nd Signal Processing and Communications Applications Conference (SIU).
[21] Wolfgang Leister,et al. An Evaluation Scenario for Adaptive Security in eHealth , 2013 .
[22] Sharath Pankanti,et al. Guide to Biometrics , 2003, Springer Professional Computing.