相关参考文献
注意:仅列出部分参考文献,下载原文获取全部文献信息。PassContext and PassActions: transforming authentication into multi-dimensional contextual and interaction sequences
K. S. Kuppusamy
JOURNAL OF AMBIENT INTELLIGENCE AND HUMANIZED COMPUTING (2020)
Gait identification using a new time-warped similarity metric based on smartphone inertial signals
Sougata Deb et al.
JOURNAL OF AMBIENT INTELLIGENCE AND HUMANIZED COMPUTING (2020)
Your Eyes Reveal Your Secrets: An Eye Movement Based Password Inference on Smartphone
Yao Wang et al.
IEEE TRANSACTIONS ON MOBILE COMPUTING (2020)
Provably leakage-resilient three-party password-based authenticated key exchange
Ou Ruan et al.
JOURNAL OF AMBIENT INTELLIGENCE AND HUMANIZED COMPUTING (2019)
Provably secure anonymous three-factor authentication scheme for multi-server environments
Dongqing Xu et al.
JOURNAL OF AMBIENT INTELLIGENCE AND HUMANIZED COMPUTING (2019)
Human Physical Activity Recognition Using Smartphone Sensors
Robert-Andrei Voicu et al.
SENSORS (2019)
An enhanced three factor based authentication protocol using wireless medical sensor networks for healthcare monitoring
Rifaqat Ali et al.
Journal of Ambient Intelligence and Humanized Computing (2018)
The rise of keyloggers on smartphones: A survey and insight into motion-based tap inference attacks
Muzammil Hussain et al.
PERVASIVE AND MOBILE COMPUTING (2016)
Email mining: tasks, common techniques, and tools
Guanting Tang et al.
KNOWLEDGE AND INFORMATION SYSTEMS (2014)
Keyboard Acoustic Emanations Revisited
Li Zhuang et al.
ACM TRANSACTIONS ON INFORMATION AND SYSTEM SECURITY (2009)
Chat mining: Predicting user and message attributes in computer-mediated communication
Tayfun Kucukyilmaz et al.
INFORMATION PROCESSING & MANAGEMENT (2008)