<--- Back to Details
First PageDocument Content
Identification / Computing / Cryptography / Security engineering / Touchscreens / Multi-touch / Biometrics / Gesture / Authentication / Support vector machine / Shoulder surfing / Tablet computer
Date: 2017-04-03 15:58:59
Identification
Computing
Cryptography
Security engineering
Touchscreens
Multi-touch
Biometrics
Gesture
Authentication
Support vector machine
Shoulder surfing
Tablet computer

Multi-touch Authentication Using Hand Geometry and Behavioral Information Yunpeng Song† Zhongmin Cai†*

Add to Reading List

Source URL: www.ieee-security.org

Download Document from Source Website

File Size: 733,56 KB

Share Document on Facebook

Similar Documents

Evaluating Behavioral Biometrics for Continuous Authentication: Challenges and Metrics Simon Eberz Kasper B. Rasmussen

Evaluating Behavioral Biometrics for Continuous Authentication: Challenges and Metrics Simon Eberz Kasper B. Rasmussen

DocID: 1xVQY - View Document

CASE STUDY  VOICE BIOMETRICS JUST THE VOICE TO VERIFY THE IDENTITY OF TATRA BANKA CLIENTS COMPANY:	 Tatra Banka

CASE STUDY VOICE BIOMETRICS JUST THE VOICE TO VERIFY THE IDENTITY OF TATRA BANKA CLIENTS COMPANY: Tatra Banka

DocID: 1xUAY - View Document

Broken Hearted: How To Attack ECG Biometrics Simon Eberz Nicola Paoletti  Marc Roeschlin

Broken Hearted: How To Attack ECG Biometrics Simon Eberz Nicola Paoletti Marc Roeschlin

DocID: 1xUjz - View Document

PDF Document

DocID: 1xSV6 - View Document

DOC Document

DocID: 1xMH5 - View Document