13.07.2015 Views

Thesis - Instituto de Telecomunicações

Thesis - Instituto de Telecomunicações

Thesis - Instituto de Telecomunicações

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

180 BIBLIOGRAPHY[114] A. Jain, A. Ross, and S. Prabhakar. An introduction to biometric recognition. IEEETransactions on Circuits and Systems for Vi<strong>de</strong>o Technology, 14(1):4– 20, 2004.[115] A. Jain and D. Zongker. Feature selection: evaluation, application, and small sampleperformance. Pattern Analysis and Machine Intelligence, IEEE Transactions on,19:153–158, 1997.[116] A. K. Jain, S. Dass, and K. Nandakumar. Soft biometric traits for personal i<strong>de</strong>ntification.In SPIE Symposium on Defence and Security, 2003.[117] A. K. Jain, S. C. Dass, and K. Nandakumar. Can soft biometric traits assist userrecognition? In A. K. Jain and N. K. Ratha, editors, Biometric Technology for HumanI<strong>de</strong>ntification, volume 5404 of Presented at the Society of Photo-Optical InstrumentationEngineers (SPIE) Conference, pages 561–572, Aug. 2004.[118] A. K. Jain, S. Pankanti, S. Prabhakar, L. Hong, and A. Ross. Biometrics: A grandchallenge. 17th International Conference on Pattern Recognition (ICPR’04), 02:935–942, 2004.[119] A. K. Jain and A. Ross. Learning user-specific parameters in a multibiometric system.In Proceedings of International Conference on Image Processing (ICIP), September2002.[120] I. Jermyn, A. Mayer, F. Monrose, M. K. Reiter, and A. D. Rubin. The <strong>de</strong>sign andanalysis of graphical passwords. In Proceedings of the 8th USENIX Security Symposium,1999.[121] C. H. Jiang, S. Shieh, and J. C. Liu. Keystroke statistical learning mo<strong>de</strong>l for webauthentication. In Proceedings of the 2nd ACM Symposium on Information, Computerand Communications Security (ASIACCS ’07), pages 359–361, New York, NY, USA,2007. ACM Press.[122] A. M. Junker and D. M. Marler. Hands-free universal computer access for personswith multiple disabilities, a case study. In Technology and Persons with DisabilitiesConference, 2005.[123] M. Kamal. Biometrics, what and how. Technical report, InfoSec Writers, 2007.

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!