共 50 条
- [42] Security Analysis and Enhancements of a User Authentication Scheme International Journal of Network Security, 2021, 23 (05): : 895 - 903
- [43] An Evaluation of the Power Consumption of Coauthentication as a Continuous User Authentication Method in Mobile Systems ACMSE 2020: PROCEEDINGS OF THE 2020 ACM SOUTHEAST CONFERENCE, 2020, : 268 - 271
- [44] Security Analysis of Robust User Authentication Protocol PROCEEDINGS OF THE 2010 8TH INTERNATIONAL CONFERENCE ON COMMUNICATIONS (COMM), 2010, : 457 - 460
- [45] Biometric user authentication for heightened information security BIOMETRIC AUTHENTICATION, PROCEEDINGS, 2004, 3072 : 708 - 715
- [46] A Security Architecture Based on User Authentication of Bluetooth 2009 INTERNATIONAL FORUM ON INFORMATION TECHNOLOGY AND APPLICATIONS, VOL 3, PROCEEDINGS, 2009, : 627 - +
- [48] Flexible and Transparent User Authentication for Mobile Devices EMERGING CHALLENGES FOR SECURITY, PRIVACY AND TRUST: 24TH IFIP TC 11 INTERNATIONAL INFORMATION SECURITY CONFERENCE, SEC 2009, PROCEEDINGS, 2009, 297 : 1 - 12
- [49] LEARNING ON A BUDGET FOR USER AUTHENTICATION ON MOBILE DEVICES 2018 IEEE INTERNATIONAL CONFERENCE ON ACOUSTICS, SPEECH AND SIGNAL PROCESSING (ICASSP), 2018, : 2042 - 2046
- [50] Seeing beyond visibility: A Four Way Fusion of User Authentication for Efficient Usable Security on Mobile Devices 2014 IEEE EIGHTH INTERNATIONAL CONFERENCE ON SOFTWARE SECURITY AND RELIABILITY - COMPANION (SERE-C 2014), 2014, : 121 - 129