<--- Back to Details
First PageDocument Content
Biometrics / Computer network security / Two-factor authentication / Authentication / Multi-factor authentication / Password / Fingerprint / Keystroke dynamics / Security token / Security / Access control / Identification
Date: 2014-05-16 10:52:32
Biometrics
Computer network security
Two-factor authentication
Authentication
Multi-factor authentication
Password
Fingerprint
Keystroke dynamics
Security token
Security
Access control
Identification

ID Director for ISAM May 2014.pub

Add to Reading List

Source URL: www.bio-key.com

Download Document from Source Website

File Size: 115,15 KB

Share Document on Facebook

Similar Documents

Analyzing the Keystroke Dynamics of Web Identifiers Andrew G. West Verisign Labs 
 
 


DocID: 1uSTZ - View Document

Humancomputer interaction / Computer security / Computer access control / Password / Security / Cybercrime / Security token / Eye tracking / Virtual keyboard / Challengeresponse authentication / Keystroke logging / Keystroke dynamics

Microsoft Word - SOUPSReducing Shoulder-surfing by Using Gaze-based Password Entry _final for publishing_.doc

DocID: 1qsWC - View Document

Detectors / Radio electronics / Biometrics / Keystroke dynamics / Statistics / Statistical inference

Should Security Researchers Experiment More and Draw More * Inferences? * With thanks to Walter Tichy’s “Should Computer Scientists Experiment More?” (1998)

DocID: 1pdJA - View Document

Computer keyboards / Input/output / Biometrics / Keystroke dynamics / Keypad / Numeric keypad / Typing / Personal identification number / Apple Keyboard / Telephone keypad / Function key / Feedback

Timing Attacks on PIN Input Devices Denis Foo Kune Yongdae Kim CSE Department

DocID: 1oyy7 - View Document

Keystroke Dynamics as a Biometric for Authentication Fabian Monrose Courant Institute of Mathematical Sciences, New York University, New York, NY.,

DocID: 1mkl8 - View Document