First Page | Document Content | |
---|---|---|
![]() Date: 2009-05-25 10:08:10Security Face recognition Lenovo Supercomputing in China Zhongguancun Facial recognition system Keystroke dynamics Laptop Hand geometry Biometrics Surveillance Computing | Source URL: www.ida.liu.seDownload Document from Source WebsiteFile Size: 284,08 KBShare Document on Facebook |
![]() | Analyzing the Keystroke Dynamics of Web Identifiers Andrew G. West Verisign LabsDocID: 1uSTZ - View Document |
![]() | Microsoft Word - SOUPSReducing Shoulder-surfing by Using Gaze-based Password Entry _final for publishing_.docDocID: 1qsWC - View Document |
![]() | Should Security Researchers Experiment More and Draw More * Inferences? * With thanks to Walter Tichy’s “Should Computer Scientists Experiment More?” (1998)DocID: 1pdJA - View Document |
![]() | Timing Attacks on PIN Input Devices Denis Foo Kune Yongdae Kim CSE DepartmentDocID: 1oyy7 - View Document |
![]() | Keystroke Dynamics as a Biometric for Authentication Fabian Monrose Courant Institute of Mathematical Sciences, New York University, New York, NY.,DocID: 1mkl8 - View Document |