|
[1] Ashbourn, J., “Biometric. Advanced Identity Verification. The Complete Guide” Springer, Berlin Heidelberg New York, 2000. [2] Clarke, N., Furnell, S., Rodwell, P.and Reynolds, P. “Acceptance of subscriber authentication for mobile telephony devices”, Computers & Security, Vol 21(3), pp. 220-228, 2002. [3] David M.J. Tax, “Data description toolbox (dd_tools) toolbox version 1.7.3.”, 2009, available from: http://homepage.tudelft.nl/n9d04/dd_tools.html [4] Defeng Wang, Daniel S. Yeung and Eric C. C. Tsang, “Structured One-Class Classification” IEEE Transactions on Systems, Man and Cybernetics, Part B, vol. 36, no. 6, pp. 1283–1295, 2006. [5] D.M.J. Tax, “One-class classification; Concept-learning in the absence of counter-examples”, Ph.D. thesis Delft University of Technology, ASCI Dissertation Series, 65, Delft, 19 June 2001, 1-190. [6] E. Rukzio. “Physical Mobile Interactions: Mobile Devices as Pervasive Mediators for Interactions with the Real World.” PhD thesis, LMU Munchen, 2006. [7] Gartner, Inc. “Gartner Identifies the Top 10 Consumer Mobile Applications for 2012”, STAMFORD, Conn., 18 November 2009, available from: http://www.gartner.com/it/page.jsp?id=1230413 [8] Gartner, Inc. “Gartner Says Worldwide Mobile Device Sales to End Users Reached 1.6 Billion Units in 2010; Smartphone Sales Grew 72 Percent in 2010”, Egham, UK,9 February 2011, available from: http://www.gartner.com/it/page.jsp?id=1543014 30 [9] Google, Android? Platform, available from: http://developer.android.com/index.html [10] Khan, S. S., ''Kernels for One-Class Nearest Neighbour Classification and Comparison of Chemical Spectral Data'', Unpublished master''s thesis, National University of Ireland Galway, Galway, Ireland, 2010. [11] N.L. Clarke and S.M. Furnell, “Advanced user authentication for mobile devices“, Computers & Security, Vol 26, pp. 109-119, 2007. [12] N. L. Clarke and S. M. Furnell, “Authenticating mobile phone users using keystroke analysis”, International Journal of Information Security, Vol 6(1), pp.1-14, 2007 [13] S. Fuenell, “Beyound the PIN: Enhancing user authentication for mobile devices”, Computer Fraud & Security, pp. 12-17, Aug. 2008.
|