1 |
ISO/IEC 29115, Information technology -- Security techniques - Entity authentication assurance framework, 2013.
|
2 |
UK CESG, Good Practice Guide No. 44 Authentication and Credentials for use with HMG Online Services, October 2014.
|
3 |
DRAFT NIST Special Publication 800-63-3, Digital Identity Guidelines, 2017.6.
|
4 |
ITU-T X.1254, Entity authentication assurance framework, 2013.
|
5 |
OASIS trust-el-protocol-v1.0 "Authentication Step-Up Protocol and Metadata Version 1.0"Edited by Andrew Hughes, Shaheen Abdul Jabbar, Shaheen Abdul Jabbar, Abbie Barbir, Mary Ruddy. 24 May 2016. OASIS Committee Specification 01. Latest version: http://docs.oasis-open.org/trust-el/trust-el-protocol/v1.0/os/trust-el-protocol-v1.0-os.pdf
|
6 |
Roman V.Yampolskiy, Venu Govindaraju, "Behavioural biometrics: a survey and classification", International Journal of Biometrics (IJBM), 2008.
|
7 |
Blase Ur, Sean M. Segreti, Lujo Bauer, Nicolas Christin, Lorrie Faith Cranor, Saranga Komanduri, Darya Kurilova, Michelle L. Mazurek, William Melicher, Richard Shay, "Measuring Real-World Accuracies and Biases in Modeling Password Guessability", USENIX Security Symposium, 2015.8
|
8 |
NIST SP 800-76-2, Biometric Specifications for Personal Identity Verification, 2013.7
|
9 |
Tobias Stockinger, "Implicit Authentication On Mobile Devices", Media Informatics Advanced, Seminar on Ubiquitous Computing, 2011.
|
10 |
Paulo Silva, "A new level of Biometric Technology Solutions", Fujitsu, 2013
|
11 |
Florian Schroff, Dmitry Kalenichenko, James Philbin, "FaceNet: A Unified Embedding for Face Recognition and Clustering", 2015. 1.
|