共 16 条
[1]
[Anonymous], 1999, Biometrics: personal identification in networked society
[2]
[Anonymous], USING RDTSC INSTRUCT
[3]
ARAUJO LCF, 2003, P 1 INF INT C ART IN, P1038
[5]
DIMENSIONALITY REDUCTION AND FEATURE-EXTRACTION APPLICATIONS IN IDENTIFYING COMPUTER USERS
[J].
IEEE TRANSACTIONS ON SYSTEMS MAN AND CYBERNETICS,
1991, 21 (02)
:452-456
[6]
Coltell O., 1999, Proceedings IEEE 33rd Annual 1999 International Carnahan Conference on Security Technology (Cat. No.99CH36303), P203, DOI 10.1109/CCST.1999.797915
[7]
Enhanced password authentication through fuzzy logic
[J].
IEEE EXPERT-INTELLIGENT SYSTEMS & THEIR APPLICATIONS,
1997, 12 (06)
:38-45
[8]
Haider S, 2000, IEEE SYS MAN CYBERN, P1336, DOI 10.1109/ICSMC.2000.886039
[10]
Lin DT, 1997, 1997 IEEE INTERNATIONAL CONFERENCE ON NEURAL NETWORKS, VOLS 1-4, P174, DOI 10.1109/ICNN.1997.611659