Keystroke dynamics

Results: 83



#Item
21Surveillance / Point of sale / Retailing / Computer keyboard / Function key / Technology / Electronics / Keystroke dynamics / Business / Embedded systems / Business software

Quick Start Guide In this Guide • Software Installation • Security Issues

Add to Reading List

Source URL: www.keystrokepos.com

Language: English - Date: 2011-12-12 14:58:44
22Security / HP WebOS / Gesture / HP TouchPad / Multi-touch / Keystroke dynamics / Authentication / Synaptics / SwIPe / Computing / User interface techniques / Software

Gesture-based Continuous Authentication for Wearable Devices: the Google Glass Case arXiv:1412.2855v1 [cs.CR] 9 DecJagmohan Chauhan

Add to Reading List

Source URL: arxiv.org

Language: English - Date: 2014-12-09 20:27:35
23Linear algebra / Machine learning / Biometrics / Surveillance / Pattern recognition / Keystroke dynamics / Vector space / Euclidean vector / X Window System / Algebra / Mathematics / Abstract algebra

A Behavioural Biometric System Based on Human Computer Interaction Hugo Gamboaa and Ana Fredb a Escola Superior de Tecnologia de Set´

Add to Reading List

Source URL: www.lx.it.pt

Language: English - Date: 2010-07-24 14:01:23
24Computing / Keystroke dynamics / Four-square cipher / Human–computer interaction / Keystroke-level model / Education

! ~ln-ah~ctkm Graphics, and image Pet c:essing J.D. f:oIe,..,

Add to Reading List

Source URL: www.cs.cmu.edu

Language: English - Date: 2005-02-06 13:37:31
25Hand geometry / Iris recognition / Access control / Fingerprint / Authentication / Automated fingerprint identification / Biometric points / BioAPI / Biometrics / Security / Keystroke dynamics

Everything You Need to Know About Biometrics By Erik Bowman, Identix Corporation January 2000 A technology that has been around Chances are this is not your first exposure to the field of biometric identification. After

Add to Reading List

Source URL: www.biometrie-online.net

Language: English - Date: 2014-10-27 18:35:21
26Identification / Iris recognition / Keystroke dynamics / Speaker recognition / Facial recognition system / Identity document / Biometric points / Fingerprint / Private biometrics / Biometrics / Security / Surveillance

1999 Glossary of Biometric Terms Association for Biometrics (AfB) and International Computer Security Association (ICSAGlossary of Biometric Terms

Add to Reading List

Source URL: www.biometrie-online.net

Language: English - Date: 2014-10-27 18:35:21
27Hierarchical hidden Markov model / Computational linguistics / Science / Human–computer interaction / Hidden Markov model / Speech recognition / Keystroke dynamics / Forward–backward algorithm / Markov models / Bioinformatics / Statistics

Learning Complex Event Descriptions by Abstraction Ugo Galassi1, Attilio Giordana1 , Lorenza Saitta1 and Marco Botta2 1 Universit´a Amedeo Avogadro, Dipartimento di Informatica Via Bellini 25/G, 15100 Alessandria, Italy

Add to Reading List

Source URL: www.ugogalassi.net

Language: English - Date: 2005-09-14 02:53:00
28Aesthetics / Axiology / HSL and HSV / Keystroke dynamics / Eye tracking / Co-occurrence matrix / Design / Human–computer interaction / Image processing / Biometrics

364 IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, VOL. 9, NO. 3, MARCH 2014 Faved! Biometrics: Tell Me Which Image You Like and I’ll Tell You Who You Are

Add to Reading List

Source URL: profs.sci.univr.it

Language: English - Date: 2014-05-20 05:43:04
29Speaker recognition / Keystroke dynamics / Authentication / Password / Multi-factor authentication / Challenge-response authentication / One-time password / Finger vein recognition / Biometrics Institute / Security / Biometrics / Access control

Myths and Misunderstandings about Speaker Authentication A white paper by Dr. Judith A. Markowitz, president J. Markowitz, Consultants Introduction Speaker authentication is a biometric technology that uses the acoustic

Add to Reading List

Source URL: www.jmarkowitz.com

Language: English - Date: 2010-06-09 15:30:54
30Surveillance / Two-factor authentication / Multi-factor authentication / PerSay / Nuance Communications / Keystroke dynamics / Iris recognition / CBEFF / Biometrics Institute / Biometrics / Security / Access control

CONFIDENTIAL Monitoring Report – February, 2007 J. Markowitz, Consultants Program A: Competitive Landscape and Standards Activities This report is confidential and intended for registered JMC clients only Competitive L

Add to Reading List

Source URL: www.jmarkowitz.com

Language: English - Date: 2010-06-09 15:30:53
UPDATE