共 15 条
[1]
[Anonymous], 2015, INT C PASSW
[2]
[Anonymous], 2013, Cryptology and Network Security
[3]
Touchstroke: Smartphone User Authentication Based on Touch-Typing Biometrics
[J].
NEW TRENDS IN IMAGE ANALYSIS AND PROCESSING - ICIAP 2015 WORKSHOPS,
2015, 9281
:27-34
[4]
Buriro B. Crispo, 2017, IEEE INT C ID SEC BE
[5]
Conti Mauro., 2011, Mind how you answer me!: transparently authenticating the user of a smartphone when answering or placing a call, P249, DOI DOI 10.1145/1966913.1966945
[6]
Eremin A, 2017, PROC CONF OPEN INNOV, P62, DOI 10.23919/FRUCT.2017.8071293
[7]
Greena R., 2016, INT J ADV RES TRENDS, V3, P92
[8]
Jiang Zhu, 2013, 2013 International Conference on Computing, Networking and Communications (ICNC 2013), P1128, DOI 10.1109/ICCNC.2013.6504251
[9]
Li L., 2013, 20 ANN NETW DISTR SY
[10]
Miao W., DEV APPL USE SENSORS