Works matching DE "KEYSTROKE timing authentication"
1
- Sensors & Materials, 2018, v. 30, n. 3,Part 1, p. 385, doi. 10.18494/SAM.2018.1757
- Chu-Hsing Lin;
- Jung-Chun Liu;
- Ken-Yu Lee
- Article
2
- Frontiers in Human Neuroscience, 2013, v. 7, p. 1, doi. 10.3389/fnhum.2013.00835
- Ahmad, Nasir;
- Szymkowiak, Andrea;
- Campbell, Paul A.
- Article
3
- IET Biometrics (Wiley-Blackwell), 2022, v. 11, n. 2, p. 157, doi. 10.1049/bme2.12065
- Article
4
- Language Testing in Asia, 2017, v. 7, n. 1, p. 1, doi. 10.1186/s40468-017-0040-5
- Article
5
- International Journal of Distributed Sensor Networks, 2015, v. 2015, p. 1, doi. 10.1155/2015/470274
- Article
6
- Journal of Applied Security Research, 2015, v. 10, n. 3, p. 375, doi. 10.1080/19361610.2015.1038767
- Visumathi, J.;
- Jesu Jayarin, P.
- Article
7
- Educational Technology & Society, 2017, v. 20, n. 4, p. 24
- Article
8
- Written Communication, 2012, v. 29, n. 3, p. 246, doi. 10.1177/0741088312451108
- Baaijen, Veerle M.;
- Galbraith, David;
- de Glopper, Kees
- Article
9
- Turkish Journal of Electrical Engineering & Computer Sciences, 2018, v. 26, n. 4, p. 1698, doi. 10.3906/elk-1711-410
- JAWED, Hani;
- ZIAD, Zara;
- KHAN, Muhammad Mubashir;
- ASRAR, Maheen
- Article
10
- Interactive Learning Environments, 2018, v. 26, n. 4, p. 476, doi. 10.1080/10494820.2017.1341941
- Bälter, Olle;
- Zimmaro, Dawn
- Article
11
- Journal of Writing Research, 2014, v. 6, n. 3, p. 233
- Khuder, Baraa;
- Harwood, Nigel
- Article
12
- IEEE Transactions on Dependable & Secure Computing, 2013, v. 10, n. 1, p. 40, doi. 10.1109/TDSC.2012.76
- Ortolani, Stefano;
- Giuffrida, Cristiano;
- Crispo, Bruno
- Article
13
- Journal of Information Science & Engineering, 2015, v. 31, n. 1, p. 23
- JAIN-SHING WU;
- CHIH-TA LIN;
- YUH-JYE LEE;
- SONG-KONG CHONG
- Article
14
- Journal of Information Science & Engineering, 2009, v. 25, n. 5, p. 1485
- YING-SUNG LEE;
- HSIEN-TE CHIEN;
- WEN-NUNG TSAI
- Article
15
- Journal of Cryptology, 2010, v. 23, n. 3, p. 402, doi. 10.1007/s00145-010-9061-2
- Katz, Jonathan;
- Ji Shin;
- Smith, Adam
- Article
16
- Concurrency & Computation: Practice & Experience, 2004, v. 16, n. 11, p. 1063, doi. 10.1002/cpe.804
- Atallah, Mikhail J.;
- Lonardi, Stefano
- Article
17
- Concurrency & Computation: Practice & Experience, 2004, v. 16, n. 11, p. 1077, doi. 10.1002/cpe.805
- Gassend, Blaise;
- Lim, Daihyun;
- Clarke, Dwaine;
- Van Dijk, Marten;
- Devadas, Srinivas
- Article
18
- ISRN Signal Processing, 2013, p. 1, doi. 10.1155/2013/565183
- Article
19
- Attention, Perception & Psychophysics, 2015, v. 77, n. 1, p. 282, doi. 10.3758/s13414-014-0756-6
- Snyder, Kristy;
- Logan, Gordon;
- Yamaguchi, Motonori
- Article
20
- KSII Transactions on Internet & Information Systems, 2011, v. 5, n. 11, p. 2221, doi. 10.3837/tiis.2011.11.020
- Woo Yong Choi;
- Yongwha Chung;
- Jin-Won Park;
- Dowon Hong
- Article
21
- KSII Transactions on Internet & Information Systems, 2011, v. 5, n. 11, p. 2204, doi. 10.3837/tiis.2011.11.019
- Chang-Seop Park;
- Hyun-Sun Kang
- Article
22
- KSII Transactions on Internet & Information Systems, 2008, v. 2, n. 6, p. 312, doi. 10.3837/tiis.2008.06.003
- Jeong Ok Kwon;
- Ik Rae Jeong;
- Dong Hoon Lee
- Article
23
- Human-Computer Interaction, 2015, v. 30, n. 1, p. 1, doi. 10.1080/07370024.2013.828564
- Kim, Jong Wook;
- Ritter, Frank E.
- Article
24
- Ekscentar, 2010, n. 13, p. 15
- Article
25
- International Journal of Information Security Science, 2015, v. 4, n. 2, p. 26
- Sznur, Sebastián;
- García, Sebastián
- Article
26
- Statistica Neerlandica, 2009, v. 63, n. 4, p. 432, doi. 10.1111/j.1467-9574.2009.00434.x
- Douhou, Salima;
- Magnus, Jan R.
- Article
27
- International Journal of Advances in Soft Computing & Its Applications, 2014, v. 6, n. 3, p. 94
- Babaeizadeh, Mahnoush;
- Bakhtiari, Majid;
- Maarof, Mohd Aizaini
- Article
28
- Journal of Sensors, 2015, v. 2015, p. 1, doi. 10.1155/2015/935986
- Article
29
- Information Technology for Development, 2014, v. 20, n. 2, p. 196, doi. 10.1080/02681102.2013.814040
- Jenkins, Jeffrey L.;
- Grimes, Mark;
- Proudfoot, Jeffrey Gainer;
- Lowry, Paul Benjamin
- Article
30
- IETE Technical Review, 2017, v. 34, n. 5, p. 478, doi. 10.1080/02564602.2016.1203271
- Bhardwaj, Ishan;
- Londhe, Narendra D.;
- Kopparapu, Sunil K.
- Article
31
- Interacting with Computers, 2013, v. 25, n. 3, p. 242, doi. 10.1093/iwc/iws014
- Morgan, Jonathan H.;
- Cheng, Chen-Yang;
- Pike, Christopher;
- Ritter, Frank E.
- Article
32
- Journal of ICT Research & Applications, 2013, v. 7, n. 2, p. 117, doi. 10.5614/itbj.ict.res.appl.2013.7.2.2
- Al-Haiqi, Ahmed;
- Ismail, Mahamod;
- Nordin, Rosdiadee
- Article
34
- Journal of Information System Security, 2015, v. 11, n. 3, p. 171
- Leberknight, Christopher S.
- Article
35
- Journal of Information System Security, 2015, v. 11, n. 3, p. 169
- Article
36
- Intelligent Automation & Soft Computing, 2010, v. 16, n. 4, p. 519, doi. 10.1080/10798587.2010.10643098
- Jong-Hyouk Lee;
- Moonseong Kim;
- Byoung-Soo Koh;
- Tai-Myoung Chung
- Article
37
- BioMedical Engineering OnLine, 2014, v. 13, n. 1, p. 1, doi. 10.1186/1475-925X-13-81
- Po-Ming Lee;
- Wei-Hsuan Tsui;
- Tzu-Chien Hsiao
- Article
38
- Journal of New Business Ideas & Trends, 2018, v. 16, n. 2, p. ii
- Perrin, Ronald William;
- Vucetic, Thomas
- Article
39
- Journal of New Business Ideas & Trends, 2018, v. 16, n. 2, p. 24
- Article
40
- Journal of Organizational & End User Computing, 2012, v. 24, n. 1, p. 42, doi. 10.4018/joeuc.2012010103
- Ngugi, Benjamin;
- Tarasewich, Peter;
- Recce, Michael
- Article
41
- Multimedia Tools & Applications, 2019, v. 78, n. 6, p. 6679, doi. 10.1007/s11042-018-6448-9
- Article
42
- Multimedia Tools & Applications, 2017, v. 76, n. 24, p. 25749, doi. 10.1007/s11042-017-4571-7
- Pleva, Matúš;
- Ondáš, Stanislav;
- Juhár, Jozef;
- Bours, Patrick
- Article
43
- Wireless Personal Communications, 2017, v. 97, n. 3, p. 4729, doi. 10.1007/s11277-017-4748-4
- Article
44
- Cybersecurity (2523-3246), 2021, v. 4, n. 1, p. 1, doi. 10.1186/s42400-021-00075-9
- Yang, Lulu;
- Li, Chen;
- You, Ruibang;
- Tu, Bibo;
- Li, Linghui
- Article
45
- Journal of the Association for Information Systems, 2009, v. 10, n. 2, p. 63
- Keith, Mark;
- Shao, Benjamin;
- Steinbart, Paul
- Article
46
- e-Service Journal, 2011, v. 7, n. 3, p. 20, doi. 10.2979/eservicej.7.3.20
- Ngugi, Benjamin;
- Kamis, Arnold;
- Tremaine, Marilyn
- Article
47
- Journal of Management & Engineering Integration, 2013, v. 6, n. 2, p. 86
- King, Alex;
- Wahjudi, Paulus
- Article
48
- Ergonomics, 2009, v. 52, n. 9, p. 1153, doi. 10.1080/00140130902919121
- Liang, Huey-Wen;
- Hwang, Yaw-Huei;
- Chang, Fu-Han
- Article
49
- International Journal of Information Security, 2007, v. 6, n. 1, p. 1, doi. 10.1007/s10207-006-0006-6
- Article
50
- International Journal of Information Security, 2006, v. 5, n. 2, p. 92, doi. 10.1007/s10207-006-0084-5
- Nali, Deholo;
- Adams, Carlisle;
- Miri, Ali
- Article