1 |
S. Furnell, N. Clarke, and S. Karatzouni, “Beyond the PIN: Enhancing User Authentication for Mobile Devices,” Computer Fraud & Security, vol. 8, August 2008, pp.12- 17. |
미소장 |
2 |
S. Chiasson, R. Biddle, and P. C. v. Oorschot, “A second look at the usability of click-based graphical passwords,” Proc. SOUPS '07, 2007, pp.1-12. |
미소장 |
3 |
Google, Inc., “Enhancing Security with Device Management Policies”, Retrieved September 15, 2012, from Android OS Developer Guide: http://developer.android.com/training/enterprise/devicemanagement- policy.html [Online] |
미소장 |
4 |
M.A. Carrera-Perpinan, “Compression neural networks for feature extraction: Application to human recognition from ear images”, Master (M.Sc) Thesis, Technical University of Madrid, 1995 |
미소장 |
5 |
Human Ear Recognition in 3D  |
미소장 |
6 |
J Kent, “Malaysia car thieves steal finger”, Retrieved March 31, 2005, from BBC News UK: http://news.bbc.co.uk/2/hi/asia-pacific/4396831.stm [Online] |
미소장 |
7 |
F. Aloul, S. Zahidi, and W. El-Hajj, “Multi Factor Authentication Using Mobile Phones,” Int. J. of Math and Comp. Sci., vol. 4, no. 2, July 2009, pp. 65–80. |
미소장 |
8 |
A.T.B. Jin, D. N. C. Ling, and A. Goh, “Biohashing: Two Factor Authentication Featuring Fingerprint Data and Tokenised Random Number,” J. of Pattern Recognition vol. 37, no. 11, November 2004, pp.2245-2255. |
미소장 |
9 |
A.P. Sabzevar and A. Stavrou, “Universal Multi-Factor Authentication Using Graphical Passwords,” Proc. SITIS’08, pp.625-632. |
미소장 |
10 |
Confident Technologies, Inc., Survey Shows Smartphone Users Choose Convenience over Security, Retrieved September 29, 2011, from Confident Technologies’ News Event: http://www.confidenttechnologies.com/news_events/surv ey-shows-smartphone-users-choose-convenience-oversecurity [Online] |
미소장 |
11 |
D. Roman-Liu and T. Tokarski, “Upper limb Strength in Relation to Upper Limb Posture,” Int. J. of Industrial Ergonomics vol.35, no.1, January 2005, pp.19-31. |
미소장 |
12 |
A.K. Bourke, J.V. O’Brien, G.M. Lyons, “Evaluation of A Threshold-based Tri-axial Accelerometer Fall Detection Algorithm,” J Gait and Posture vol. 26, no. 2, July 2007, pp.194-199.. |
미소장 |
13 |
Ali Fahmi PN, E. Kodirov, M. F. A. Abdullah, D. Choi, and S. Sayeed, “Arm’s flex when responding Call for Implicit User Authentication in Smartphone,” Int. J. of Security and Its Applications vol. 6, no. 3, July 2012, pp. 58-64. |
미소장 |
14 |
D. J. Berndt and J. Clifford, “Using Dynamic Time Warping to Find Patterns in Time Series,” In AAAI Technical Report ’94 Workshop on Knowledge Discovery in Databases (KDD-94), pp.359-370 |
미소장 |
15 |
M. Burge and W. Burger, “Ear Biometrics”, In A. Jain R. Bolle and S. Pankanti, editors, Biometics: Personal Identfication in a Networked Society, Kluwer Academic, Dordrecht-The Netherlands, 1998, pp. 273-286. |
미소장 |
16 |
A comparative study of texture measures with classification based on feature distributions  |
미소장 |