共 50 条
- [31] Analysis of Keystroke Dynamics For the Generation of Synthetic Datasets [J]. 2018 INTERNATIONAL CONFERENCE ON CYBERWORLDS (CW), 2018, : 339 - 344
- [32] Improving static audio keystroke analysis by score fusion of acoustic and timing data [J]. Multimedia Tools and Applications, 2017, 76 : 25749 - 25766
- [33] Examining the Strength of Three Word Passwords [J]. ICT SYSTEMS SECURITY AND PRIVACY PROTECTION, SEC 2024, 2024, 710 : 119 - 133
- [34] RHU Keystroke Touchscreen Benchmark [J]. 2018 INTERNATIONAL CONFERENCE ON CYBERWORLDS (CW), 2018, : 363 - 368
- [35] Authenticating passwords over an insecure channel [J]. COMPUTERS & SECURITY, 1996, 15 (05) : 431 - 439
- [36] Brute Force Analysis of PsychoPass-generated Passwords [J]. 2014 37TH INTERNATIONAL CONVENTION ON INFORMATION AND COMMUNICATION TECHNOLOGY, ELECTRONICS AND MICROELECTRONICS (MIPRO), 2014, : 1366 - 1371
- [37] Time Signatures - An Implementation of Keystroke and Click Patterns for Practical and Secure Authentication [J]. 2008 THIRD INTERNATIONAL CONFERENCE ON DIGITAL INFORMATION MANAGEMENT, VOLS 1 AND 2, 2008, : 571 - 574
- [38] From Passwords to Biometrics: In Pursuit of a Panacea [J]. INFORMATION SYSTEMS SECURITY AND PRIVACY, ICISSP 2015, 2015, 576 : 3 - 15