Login / Signup
The Analyses of Key Stroke Timings using Self Organizing Maps and its Application to Authentication.
Hiroshi Dozono
Yoshio Noguchi
Masanori Nakakuni
Hisao Tokushima
Published in:
Security and Management (2006)
Keyphrases
</>
data sets
computer vision
secure communication
peer to peer
image authentication