Keystroke dynamics

Results: 83



#Item
31Data mining / Geostatistics / Keystroke dynamics / K-means clustering / Password / Biometrics / Statistics / Cluster analysis / Data analysis

ISOMA079 Main Menu World Automation Congress Seventh International Symposium on Manufacturing

Add to Reading List

Source URL: www.ong-home.my

Language: English - Date: 2013-12-12 02:50:01
32Scientific method / Evaluation methods / Biometrics / Keystroke dynamics / Password / Internal validity / Two-factor authentication / Computer keyboard / Confounding / Science / Statistics / Design of experiments

C . B . J o n e s a n d J. L . L l o y d ( E d s . ) : F e s t s c h r i f t R a n d e l l , L N C S[removed] , p p[removed] – 3 5 7 , [removed] . | ©   S p r i n g e r - Ve r l a g B erlin Heidelb erg 2011 | Republished

Add to Reading List

Source URL: www.cs.cmu.edu

Language: English - Date: 2012-03-18 00:55:46
33Access control / Biometrics / Federated identity / Identity / Authentication / Keystroke dynamics / OpenID / Security Assertion Markup Language / Password / Security / Cryptography / Identity management

COMP 3410 – I.T. in Electronic Commerce (Id)entification eSecurity Identity in Marketspaces

Add to Reading List

Source URL: www.rogerclarke.com

Language: English - Date: 2013-03-23 06:05:46
34Fingerprint / Keystroke dynamics / Iris recognition / Minutiae / Hand geometry / Authentication / Facial recognition system / Surveillance / Speaker recognition / Biometrics / Security / Fingerprint recognition

Microsoft Word - %e8%81%b3%e3%83%8c%e7%9d%a8 %e3%83%8f%e3%82%9b%e8%93%96%e3.

Add to Reading List

Source URL: repository.ksu.edu.sa

Language: English - Date: 2009-12-23 04:14:39
35Password / Cluster analysis / Biometrics / Multilayer perceptron / Artificial neural network / Authentication / Perceptron / Keystroke dynamics / Statistics / Neural networks / Security

A COMPARISON OF ARTIFICIAL NEURAL NETWORKS AND CLUSTER ANALYSIS FOR TYPING BIOMETRICS AUTHENTICATION Leenesh Kumar MAISURIA, Cheng Soon ONG & Weng Kin LAI Information Management and Computational Intellige

Add to Reading List

Source URL: www.ong-home.my

Language: English - Date: 2013-12-12 02:50:01
36National security / Surveillance / Fingerprints / Unique Identification Authority of India / Authentication / Password / Facial recognition system / Two-factor authentication / Keystroke dynamics / Security / Biometrics / Identification

Data analysis platforms Extremely-Large-Scale Biometric Authentication System - Its Practical Implementation SU Leiming, SAKAMOTO Shizuo Abstract

Add to Reading List

Source URL: in.nec.com

Language: English - Date: 2013-05-06 06:19:05
37Password / Computer network security / Authentication / Biometrics / Two-factor authentication / Keystroke dynamics / Security / Computer security / Access control

Session: I Am How I Touch: Authenticating Users CHI 2012, May 5–10, 2012, Austin, Texas, USA Touch me once and I know it’s you! Implicit Authentication based on Touch Screen Patterns

Add to Reading List

Source URL: www.medien.ifi.lmu.de

Language: English - Date: 2012-07-09 11:59:56
38ITunes / User interface techniques / User interfaces / Computer keyboards / Touchscreen / Tablet computer / Keystroke dynamics / User interface / IPod Touch / Computing / Input/output / Human–computer interaction

A Personal Touch - Recognizing Users Based on Touch Screen Behavior Sarah Martina Kolly Roger Wattenhofer

Add to Reading List

Source URL: www.tik.ee.ethz.ch

Language: English - Date: 2013-05-02 13:59:17
39Access control / Authentication / Notary / Packaging / Password / Security token / Speaker recognition / Fingerprint / Keystroke dynamics / Security / Biometrics / Identification

Information at all.net[removed]http://all.net/

Add to Reading List

Source URL: www.all.net

Language: English - Date: 2013-07-10 14:09:48
40Espionage / Password / Computing / Internet privacy / Steven Bender / Computer keyboard / Security / Keystroke logging / Surveillance / Biometrics / Keystroke dynamics

Digital Fingerprints Tiny behavioral differences can reveal your identity online Julie J. Rehmeyer Early during World War II, British intelligence officers eavesdropped on German radio

Add to Reading List

Source URL: ai.arizona.edu

Language: English - Date: 2009-01-09 15:43:23
UPDATE