共 15 条
- [1] [Anonymous], 2015, INT C PASSW
- [2] [Anonymous], 2013, Cryptology and Network Security
- [3] Touchstroke: Smartphone User Authentication Based on Touch-Typing Biometrics [J]. NEW TRENDS IN IMAGE ANALYSIS AND PROCESSING - ICIAP 2015 WORKSHOPS, 2015, 9281 : 27 - 34
- [4] Buriro B. Crispo, 2017, IEEE INT C ID SEC BE
- [5] Conti Mauro., 2011, Mind how you answer me!: transparently authenticating the user of a smartphone when answering or placing a call, P249, DOI DOI 10.1145/1966913.1966945
- [6] Eremin A, 2017, PROC CONF OPEN INNOV, P62, DOI 10.23919/FRUCT.2017.8071293
- [7] Greena R., 2016, INT J ADV RES TRENDS, V3, P92
- [8] Jiang Zhu, 2013, 2013 International Conference on Computing, Networking and Communications (ICNC 2013), P1128, DOI 10.1109/ICCNC.2013.6504251
- [9] Li L., 2013, 20 ANN NETW DISTR SY
- [10] Miao W., DEV APPL USE SENSORS