Keystroke dynamics

Results: 83



#Item
41Proceedings Template - WORD

Proceedings Template - WORD

Add to Reading List

Source URL: www.cse.unr.edu

Language: English - Date: 2011-12-03 17:58:24
42Biometric Encryption: A Positive-Sum Technology that Achieves Strong Authentication, Security AND Privacy Ann Cavoukian, Ph.D.

Biometric Encryption: A Positive-Sum Technology that Achieves Strong Authentication, Security AND Privacy Ann Cavoukian, Ph.D.

Add to Reading List

Source URL: usacac.army.mil

Language: English - Date: 2008-09-08 11:55:20
43CITeR Selected Publications (Spring[removed]Publications: Park, A.K. Jain, I. Kitahara, K. Kogure and N. Hagita,

CITeR Selected Publications (Spring[removed]Publications: Park, A.K. Jain, I. Kitahara, K. Kogure and N. Hagita, "ViSE: Visual Search Engine Using Multiple Networked Cameras",", Proc. of International Conference on Pattern

Add to Reading List

Source URL: www.clarkson.edu

Language: English - Date: 2013-03-22 14:25:37
44Microsoft Word - IBIA Written testimony to House Science Space & Technology r4.docx

Microsoft Word - IBIA Written testimony to House Science Space & Technology r4.docx

Add to Reading List

Source URL: science.house.gov

Language: English - Date: 2013-05-21 10:11:00
45Microsoft Word - paper142-mandryk.doc

Microsoft Word - paper142-mandryk.doc

Add to Reading List

Source URL: hci.usask.ca

Language: English - Date: 2011-05-26 15:01:47
46Doug McGraw, VTTI  We have developed a near real-time computer system that can locate and track a subject’s head, and then recognize the person by comparing characteristics of the face to those of known

Doug McGraw, VTTI We have developed a near real-time computer system that can locate and track a subject’s head, and then recognize the person by comparing characteristics of the face to those of known

Add to Reading List

Source URL: secure.hosting.vt.edu

Language: English - Date: 2013-01-16 17:02:32
47Cryptography / CBEFF / BioAPI / Basic Encoding Rules / Keystroke dynamics / XML / Abstract Syntax Notation One / Cryptographic hash function / Message authentication code / Security / Biometrics / Computing

XML Common Biometric Format

Add to Reading List

Source URL: xml.coverpages.org

Language: English - Date: 2005-10-18 11:23:44
48Biometrics Glossary  Introduction This set of terms was developed by the National Science & Technology Council’s (NSTC) Subcommittee on Biometrics with the full understanding that national (INCITS/M1) and international

Biometrics Glossary Introduction This set of terms was developed by the National Science & Technology Council’s (NSTC) Subcommittee on Biometrics with the full understanding that national (INCITS/M1) and international

Add to Reading List

Source URL: biometrics.gov

Language: English - Date: 2007-12-31 14:01:13
49Progressive Authentication — Voice Biometrics Key benefits >	Full compliance with NIST Level 3 requirement for strong two factor authentication, DEA Electronic Prescribing (EPCS)

Progressive Authentication — Voice Biometrics Key benefits > Full compliance with NIST Level 3 requirement for strong two factor authentication, DEA Electronic Prescribing (EPCS)

Add to Reading List

Source URL: www.equifax.com

Language: English - Date: 2012-12-18 10:28:46
50Keystroke Dynamics as a Biometric for Authentication Fabian Monrose Courant Institute of Mathematical Sciences, New York University, New York, NY., [removed]

Keystroke Dynamics as a Biometric for Authentication Fabian Monrose Courant Institute of Mathematical Sciences, New York University, New York, NY., [removed]

Add to Reading List

Source URL: cs.unc.edu

Language: English - Date: 2008-08-14 14:22:34