US employee 'outsourced job to china, p.21043693, 2013. ,
Handbook of fingerprint recognition, 2009. ,
DOI : 10.1007/978-1-84882-254-2
Handbook of face recognition, 2011. ,
Implicit Authentication through Learning User Behavior, Proceedings of ISC'2010, pp.99-113, 2011. ,
DOI : 10.1145/941311.941313
Privacy concerns of implicit secondary factors for web authentication, Adventures in Authentication, 2014. ,
Secure Multiparty Computation for Privacy Preserving Data Mining, Journal of Privacy and Confidentiality, vol.1, issue.1, p.5, 2009. ,
DOI : 10.4018/978-1-59140-557-3.ch189
Privacy-Preserving Implicit Authentication, Proceedings of SEC'2014, pp.471-484, 2014. ,
DOI : 10.1007/978-3-642-55415-5_40
URL : https://hal.archives-ouvertes.fr/hal-01370405
An Analysis of Random Projection for Changeable and Privacy-Preserving Biometric Verification, IEEE Transactions on Systems, Man, and Cybernetics, Part B (Cybernetics), vol.40, issue.5, pp.1280-1293, 2010. ,
DOI : 10.1109/TSMCB.2009.2037131
The kolmogorov-smirnov test for goodness of fit, Journal of the American Statistical Association, vol.46, issue.253, pp.68-78, 1951. ,
An introduction to kernel and nearest-neighbor nonparametric regression, The American Statistician, vol.46, issue.3, pp.175-185, 1992. ,
DOI : 10.2307/2685209
An archive of AT&T laboratories cambridge, 2002. ,
Parameterisation of a stochastic model for human face identification, Proceedings of 1994 IEEE Workshop on Applications of Computer Vision, pp.138-142, 1994. ,
DOI : 10.1109/ACV.1994.341300
POSTER, Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security, CCS'16, pp.1742-1744, 2016. ,
DOI : 10.1080/01621459.1951.10500769
The handbook of research synthesis and meta-analysis, 2009. ,
An elementary proof of a theorem of Johnson and Lindenstrauss, Random Structures and Algorithms, vol.15, issue.1, pp.60-65, 2003. ,
DOI : 10.1002/rsa.10073
Random projection in dimensionality reduction, Proceedings of the seventh ACM SIGKDD international conference on Knowledge discovery and data mining , KDD '01, pp.245-250, 2001. ,
DOI : 10.1145/502512.502546
Database-friendly random projections: Johnson-Lindenstrauss with binary coins, Journal of Computer and System Sciences, vol.66, issue.4, pp.671-687, 2003. ,
DOI : 10.1016/S0022-0000(03)00025-4
URL : https://doi.org/10.1016/s0022-0000(03)00025-4
Improved Error Bounds for Underdetermined System Solvers, SIAM Journal on Matrix Analysis and Applications, vol.14, issue.1, pp.1-14, 1993. ,
DOI : 10.1137/0614001
Random projection-based multiplicative data perturbation for privacy preserving distributed data mining, IEEE Transactions on Knowledge and Data Engineering, vol.18, issue.1, pp.92-106, 2006. ,
A data distortion by probability distribution, ACM Transactions on Database Systems, vol.10, issue.3, pp.395-411, 1985. ,
DOI : 10.1145/3979.4017
URL : http://paul.rutgers.edu/~xuehy58/p395-liew.pdf
An analytic approach to statistical databases, pp.260-274, 1983. ,
Privacy-preserving data mining, ACM SIGMOD Record, vol.29, issue.2, pp.439-450, 2000. ,
DOI : 10.1145/335191.335438
Behavioral biometrics: a remote access approach, 2008. ,
DOI : 10.4018/978-1-60566-725-6.ch005
Touchalytics: On the Applicability of Touchscreen Input as a Behavioral Biometric for Continuous Authentication, IEEE Transactions on Information Forensics and Security, vol.8, issue.1, pp.136-148, 2013. ,
DOI : 10.1109/TIFS.2012.2225048
How to Prevent to Delegate Authentication, International Conference on SECURECOMM'2015, pp.477-499, 2015. ,
DOI : 10.1504/IJCAT.2009.024593