Network Security-Improving Authentication Accuracy of Unfamiliar Passwords with Pauses and Cues for Keystroke Dynamics-Based Authentication

In O. Stock & M. Schaerf (eds.), Lecture Notes in Computer Science. Springer Verlag. pp. 3917--73 (2006)
  Copy   BIBTEX

Abstract

This article has no associated abstract. (fix it)

Links

PhilArchive



    Upload a copy of this work     Papers currently archived: 91,386

External links

  • This entry has no external links. Add one.
Setup an account with your affiliations in order to access resources via your University's proxy server

Through your library

Similar books and articles

Biometrics: body odor authentication perception and acceptance.Martin D. Gibbs - 2010 - Acm Sigcas Computers and Society 40 (4):16-24.
A new e-ID card and online authentication in Spain.Alexander Heichlinger & Patricia Gallego - 2010 - Identity in the Information Society 3 (1):43-64.
Electronic identity in Finland: ID cards vs. bank IDs. [REVIEW]Teemu Rissanen - 2010 - Identity in the Information Society 3 (1):175-194.
Authentication, Identification and Trusted Third Parties.Michel Arnaud - 2009 - Hermès: La Revue Cognition, communication, politique 53 (1):129 - +.
Cues, Watchwords, Passwords.Alphonso Lingis - 2004 - International Studies in Philosophy 36 (4):49-64.

Analytics

Added to PP
2014-01-28

Downloads
0

6 months
0

Historical graph of downloads

Sorry, there are not enough data points to plot this chart.
How can I increase my downloads?

Citations of this work

No citations found.

Add more citations

References found in this work

No references found.

Add more references