Darpa seeks authentication beyond passwords ,
Drawbridge exits closed beta, unveils crossscreen mobile marketing solutions Available: http://www.insidemobileapps.comdrawbridge- exits-closed-beta-unveils-cross-screen-mobile-marketing- solutions, 2012. ,
How Unique Is Your Web Browser?, Privacy Enhancing Technologies, pp.1-18, 2010. ,
DOI : 10.1007/978-3-642-14527-8_1
Fingerprinting information in javascript implementations, Proceedings of W2SP 2011, 2011. ,
Host fingerprinting and tracking on the web:privacy and security implications, 19th Annual Network and Distributed System Security Symposium (NDSS) 2012, Internet Society, 2012. ,
Identity theft, computers and behavioral biometrics, 2009 IEEE International Conference on Intelligence and Security Informatics, pp.155-160, 2009. ,
DOI : 10.1109/ISI.2009.5137288
Vital signs of identity [biometrics], IEEE Spectrum, vol.31, issue.2, pp.22-30, 1994. ,
DOI : 10.1109/6.259484
Behavioural biometrics: a survey and classification, International Journal of Biometrics, vol.1, issue.1, pp.81-113, 2008. ,
DOI : 10.1504/IJBM.2008.018665
Feature Analysis of Mouse Dynamics in Identity Authentication and Monitoring, 2009 IEEE International Conference on Communications, pp.673-677, 2009. ,
DOI : 10.1109/ICC.2009.5199032
Identity theft, computers and behavioral biometrics, 2009 IEEE International Conference on Intelligence and Security Informatics, pp.155-160, 2009. ,
DOI : 10.1109/ISI.2009.5137288
User re-authentication via mouse movements Visualization and data mining for computer security, ser. VizSEC/DMSEC '04, Proceedings of the 2004 ACM workshop on, pp.1-8, 2004. ,
Authentication via keystroke dynamics, Proceedings of the 4th ACM conference on Computer and communications security , CCS '97, pp.48-56, 1997. ,
DOI : 10.1145/266420.266434
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.33.1197
Keystroke-based authentication by key press intervals as a complementary behavioral biometric, 2009 IEEE International Conference on Systems, Man and Cybernetics, pp.80-85, 2009. ,
DOI : 10.1109/ICSMC.2009.5346319
An efficient user verification system via mouse movements Automatic on-line signature verification, Proceedings of the 18th ACM conference on Computer and communications security, ser. CCS '11 Proceedings of the IEEE, pp.139-150, 1997. ,
On the individuality of fingerprints, IEEE Transactions on Pattern Analysis and Machine Intelligence, vol.24, issue.8, pp.1010-1025, 2002. ,
DOI : 10.1109/TPAMI.2002.1023799
CAPTCHA: Using Hard AI Problems for Security, Proceedings of the 22nd international conference on Theory and applications of cryptographic techniques, ser. EUROCRYPT'03, pp.294-311, 2003. ,
DOI : 10.1007/3-540-39200-9_18
A Continued Commitment to Security, 2011. ,
Authentication of users on mobile telephones ??? A survey of attitudes and practices, Computers & Security, vol.24, issue.7, pp.519-527, 2005. ,
DOI : 10.1016/j.cose.2005.08.003
Biometric recognition: security and privacy concerns, IEEE Security & Privacy Magazine, vol.1, issue.2, pp.33-42, 2003. ,
DOI : 10.1109/MSECP.2003.1193209
What the internet knows about you ,
Why johnny can't browse in peace: On the uniqueness of web browsing history patterns, HotPETS, 2012. ,
URL : https://hal.archives-ouvertes.fr/hal-00747841
Web Browser History Detection as a Real-World Privacy Threat, ESORICS, pp.215-231, 2010. ,
DOI : 10.1007/978-3-642-15497-3_14
Timing attacks on Web privacy, Proceedings of the 7th ACM conference on Computer and communications security , CCS '00, pp.25-32, 2000. ,
DOI : 10.1145/352600.352606
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.32.6864
Rapid history extraction through nondestructive cache timing (v8), 2011. ,
Preventing attacks on a user's history through css :visited selectors, 2010. ,
Csfire: Transparent client-side mitigation of malicious cross-domain requests, ESSoS, pp.18-34, 2010. ,
European standard en50133-1: Alarm systems. access control systems for use in security applications. part 1: System requirements, 2002. ,