共 16 条
- [1] [Anonymous], 1999, Biometrics: personal identification in networked society
- [2] [Anonymous], USING RDTSC INSTRUCT
- [3] ARAUJO LCF, 2003, P 1 INF INT C ART IN, P1038
- [5] DIMENSIONALITY REDUCTION AND FEATURE-EXTRACTION APPLICATIONS IN IDENTIFYING COMPUTER USERS [J]. IEEE TRANSACTIONS ON SYSTEMS MAN AND CYBERNETICS, 1991, 21 (02): : 452 - 456
- [6] Coltell O., 1999, Proceedings IEEE 33rd Annual 1999 International Carnahan Conference on Security Technology (Cat. No.99CH36303), P203, DOI 10.1109/CCST.1999.797915
- [7] Enhanced password authentication through fuzzy logic [J]. IEEE EXPERT-INTELLIGENT SYSTEMS & THEIR APPLICATIONS, 1997, 12 (06): : 38 - 45
- [8] Haider S, 2000, IEEE SYS MAN CYBERN, P1336, DOI 10.1109/ICSMC.2000.886039
- [9] IDENTITY AUTHENTICATION BASED ON KEYSTROKE LATENCIES [J]. COMMUNICATIONS OF THE ACM, 1990, 33 (02) : 168 - 176
- [10] Lin DT, 1997, 1997 IEEE INTERNATIONAL CONFERENCE ON NEURAL NETWORKS, VOLS 1-4, P174, DOI 10.1109/ICNN.1997.611659