ScienceGate
Advanced Search
Author Search
Journal Finder
Blog
Sign in / Sign up
ScienceGate
Search
Author Search
Journal Finder
Blog
Sign in / Sign up
Identity Authentication Based on Dynamic Touch Behavior on Smartphone
Mapping Intimacies
◽
10.1109/icivc52351.2021.9527023
◽
2021
◽
Author(s):
Zhengjie Wang
◽
Fang Chen
◽
Naisheng Zhou
◽
Mingjing Ma
◽
Xue Li
◽
...
Keyword(s):
Identity Authentication
◽
Dynamic Touch
Download Full-text
Related Documents
Cited By
References
Physics helps psychologists understand dynamic touch
PsycEXTRA Dataset
◽
10.1037/e529982010-026
◽
1998
◽
Author(s):
Beth Azar
Keyword(s):
Dynamic Touch
Download Full-text
Faculty Opinions recommendation of Amplitude and spatial-period discrimination in sinusoidal gratings by dynamic touch.
Faculty Opinions – Post-Publication Peer Review of the Biomedical Literature
◽
10.3410/f.1002349.26104
◽
2001
◽
Author(s):
Kenneth Johnson
Keyword(s):
Spatial Period
◽
Dynamic Touch
◽
Sinusoidal Gratings
Download Full-text
Research on Time-frequency Feature Fusion Method based on Dynamic Gesture Identity Authentication
2021 IEEE 4th Advanced Information Management, Communicates, Electronic and Automation Control Conference (IMCEC)
◽
10.1109/imcec51613.2021.9482350
◽
2021
◽
Author(s):
Wang Yanna
Keyword(s):
Feature Fusion
◽
Identity Authentication
◽
Fusion Method
◽
Time Frequency
◽
Frequency Feature
Download Full-text
Lightweight identity authentication scheme for IoT devices based on blockchain
Journal of Physics Conference Series
◽
10.1088/1742-6596/1812/1/012027
◽
2021
◽
Vol 1812
(1)
◽
pp. 012027
Author(s):
Wanli Ma
◽
Qi Zhang
◽
Junwei Ma
◽
Honglin Xue
◽
Xiaowei Hao
◽
...
Keyword(s):
Identity Authentication
◽
Authentication Scheme
◽
Iot Devices
Download Full-text
In-domain User Identity Authentication Method for System Wide Information Management (SWIM)
Proceedings of the 2020 12th International Conference on Machine Learning and Computing
◽
10.1145/3383972.3383981
◽
2020
◽
Author(s):
Liu Zhigang
Keyword(s):
Information Management
◽
Identity Authentication
Download Full-text
The scheme of personal privacy protection based on data separation in Mobile identity authentication
Journal of Physics Conference Series
◽
10.1088/1742-6596/1486/5/052024
◽
2020
◽
Vol 1486
◽
pp. 052024
Author(s):
Fang Zheng
◽
Pingzhen Li
◽
Jianqin Wei
Keyword(s):
Privacy Protection
◽
Identity Authentication
◽
Personal Privacy
◽
Data Separation
Download Full-text
Biometric identity Authentication System Using Hand Geometry Measurements
Journal of Physics Conference Series
◽
10.1088/1742-6596/1804/1/012144
◽
2021
◽
Vol 1804
(1)
◽
pp. 012144
Author(s):
Hesham Hashim Mohammed
◽
Shatha A. Baker
◽
Ahmed S. Nori
Keyword(s):
Identity Authentication
◽
Authentication System
◽
Hand Geometry
Download Full-text
Two-factor identity authentication scheme based on blockchain and fuzzy extractor
Soft Computing
◽
10.1007/s00500-021-05936-6
◽
2021
◽
Author(s):
Di Bao
◽
Lin You
Keyword(s):
Identity Authentication
◽
Authentication Scheme
◽
Fuzzy Extractor
Download Full-text
Identity Authentication with Association Behavior Sequence in Machine-to-Machine Mobile Terminals
Mobile Networks and Applications
◽
10.1007/s11036-020-01706-0
◽
2021
◽
Author(s):
Congcong Shi
◽
Miao Du
◽
Weidong Lu
◽
Xiaoming He
◽
Sanglu Lu
Keyword(s):
Identity Authentication
◽
Mobile Terminals
◽
Machine To Machine
◽
Association Behavior
Download Full-text
Research of Identity Authentication of the Mobile Terminal Voting System
2013 Ninth International Conference on Intelligent Information Hiding and Multimedia Signal Processing
◽
10.1109/iih-msp.2013.58
◽
2013
◽
Author(s):
Hu Meida
◽
Teng Guifa
◽
Wang Chunshan
◽
Gao Guandong
Keyword(s):
Mobile Terminal
◽
Identity Authentication
◽
Voting System
Download Full-text
Sign in / Sign up
Close
Export Citation Format
Close
Share Document
Close