Author:
Dasgupta Dipankar,Roy Arunava,Nag Abhijit
Publisher
Springer International Publishing
Reference65 articles.
1. Guidorizzi RP (2013) Security: active authentication. IT Prof 15(4):4–7
2. Jagadeesan H, Hsiao MS (2011) Continuous authentication in computers. Continuous Authentication Using Biometrics: Data, Models, Metrics: Data, Models, Metrics (2011):40
3. Fathy ME, Patel VM, Chellappa R (2015) Face-based active authentication on mobile devices. In: 2015 IEEE international conference on acoustics, speech and signal processing (ICASSP). IEEE, pp 1687–1691
4. Viola P, Jones MJ (2004) Robust real-time face detection. Int J Comput Vision 57(2):137–154
5. Niinuma K, Jain AK (2010) Continuous user authentication using temporal information. In: SPIE Defense, Security, and Sensing. International Society for Optics and Photonics, pp 76670L–76670L
Cited by
4 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献