
Controlo de Acessos Multimodular com Dispositivo Móvel Android (CAMDMA)
Referências
[1] Anne Adams e Martina Angela Sasse. Users are not the enemy. Communications of the ACM, 42(12):40–46, 1999.
[2] Tech Target. Managing mobile authetication methods. URL: http://searchmobilecomputing.techtarget.com/feature/Managing-mobile-authentication-methods.
[3] Nathan Luke Clarke e SM Furnell. Advanced user authentication for mobile devices. computers & security, 26(2):109–119, 2007.
[4] Apple inc. iOS. URL: http://www.apple.com/ios/what-is/.
[5] MacStories. Apple Announces 40 Billion App Store Downloads, Almost 20 Billion In 2012 Alone. URL: https://www.macstories.net/news/apple-announces-40-billion-appstore-downloads-almost-20-billion-in-2012-alone/.
[6] AndoridCentral. What is Android?. URL: http://www.androidcentral.com/what-android.
[7] IDC. Smartphone OS Market Share, 2015 Q2. URL: http://www.idc.com/prodserv/smartphone-os-market-share.jsp
[8] Wikipedia. WindowsPhone. URL: https://en.wikipedia.org/wiki/WindowsPhone.
[9] IDC. IDC predicts Android market growth to end and Windows Phone to beat out iOS URL: http://www.phonearena.com/news/IDCpredicts-
Android-market-growth-to-end-and-Windows-Phone-to-beat-outiOSid30966.
[10] Garima Rani e Anshuman Saurabh. An overview of biometric techniques. Em Journal of Emerging Technologies and Innovative Research, volume 1. JETIR, 2014.
[11] Anil K Jain, Arun Ross, e Salil Prabhakar. An introduction to biometric recognition. Circuits and Systems for Video Technology, IEEE Transactions on, 14(1):4–20, 2004.
[12] Adrian Pocovnicu. Biometric security for cell phones. Informatica Economica, 13(1):57–63, 2009.
[13] Sharath Pankanti, Ruud M Bolle, e Abhishek Jain. Biometrics: The future of identification. Computer, 33(2):46–49, 2000.
[14] Aleix M Martínez e Avinash C Kak. Pca versus lda. Pattern Analysis and Machine Intelligence, IEEE Transactions on, 23(2):228–233, 2001.
[15] M. Almeida e H. Bento. Reconhecimento de padrões através de eigenfaces. URL: http: //www.sinfic.pt/SinficWeb/displayconteudo.do2?numero=44666.
[16] Timo Ojala, Matti Pietikäinen, e David Harwood. A comparative study of texture measures with classification based on featured distributions. Pattern recognition, 29(1):51–59, 1996.
[17] Caifeng Shan, Shaogang Gong, e Peter W McOwan. Facial expression recognition based on local binary patterns: A comprehensive study. Image and Vision Computing, 27(6):803–816, 2009.
[18] Ahmet Ozdil e Metin Mete Ozbilen. A survey on comparison of face recognition algorithms. Em Application of Information and Communication Technologies (AICT), 2014 IEEE 8th International Conference on, páginas 1–3. IEEE, 2014.
[19] Anil K Jain, Patrick Flynn, e Arun A Ross. Handbook of biometrics. Springer Science & Business Media, 2007.
[20] Harbi AlMahafzah e Maen Zaid AlRwashdeh. A survey of multibiometric systems. arXiv preprint arXiv:1210.0829, 2012.
[21] Anil Jain, Karthik Nandakumar, e Arun Ross. Score normalization in multimodal biometric systems. Pattern recognition, 38(12):2270–2285, 2005.
[22] Andrew Teoh, SA Samad, e A Hussain. Nearest neighbourhood classifiers in a bimodal biometric verification system fusion decision scheme. Journal of Research and Practice in Information Technology, 36(1):47–62, 2004.
[23] ISO/IEC 18004:2006. Information technology – Automatic identification and data capture techniques – QR Code 2005 bar code symbology specification. ISO, Geneva, Switzerland.
[24] Damri Samretwit e Toshihiko Wakahara. Measurement of reading characteristics of multiplexed image in qr code. Em Intelligent Networking and Collaborative Systems (INCoS), 2011 Third International Conference on, páginas 552–557. IEEE, 2011.
[25] Denso-wave.com. Qr code standardization | qr code.com. URL: http://www.qrcode.com/en/.
[26] ISO/IEC 18004:2000. Information technology – Automatic identification and data capture techniques – Bar code symbology – QR Code. ISO, Geneva, Switzerland.
[27] Sean Owen. Official zxing ("zebra crossing") project home. URL: https://github.com/zxing/zxing.
[28] Veldhuis R. N. Tao, Q. Biometric authentication for a mobile personal device. In proceedings of the IEEE 3rd Annual International Conference on Mobile and Ubiquitous Systems- Workshops, 1(03), 2006.
[29] Roy Want. An introduction to rfid technology. Pervasive Computing, IEEE, 5(1):25–33, 2006.
[30] Klaus Finkenzeller. Book tools. 2003.
[31] Ron Weinstein. Rfid: a technical overview and its application to the enterprise. IT professional, 7(3):27–33, 2005.
[32] Mike Hendry. Multi-application smart cards: technology and applications. Cambridge university press, 2007.
[33] Wikipedia. Single sign-on (sso). URL: https://en.wikipedia.org/wiki/Single_sign-on.
[34] Flavio D Garcia, Peter van Rossum, Roel Verdult, e Ronny Wichers Schreur. Wirelessly pickpocketing a mifare classic card. Em Security and Privacy, 2009 30th IEEE Symposium on, páginas 3–15. IEEE, 2009.
[35] OpenCV. Opencv. URL: http://opencv.org/.
[36] itseez. itseez. URL: http://itseez.com/.
[37] Samuel Audet. Java interface to opencv and more. URL: https://github.com/bytedeco/javacv.
[38] Robert Laganière. OpenCV 2 Computer Vision Application Programming Cookbook: Over 50 recipes to master this library of programming functions for real-time computer vision. Packt Publishing Ltd, 2011.
[39] Roy Thomas Fielding. Architectural styles and the design of network-based software architectures.
Tese de doutoramento, University of California, Irvine, 2000.
[40] IEFT. Hypertext transfer protocol – http/1.1. URL: http://www.ietf.org/rfc/rfc2616.txt.
[41] Developers. Dashboards. URL: https://developer.android.com/about/dashboards/index.html.
[42] Google. Volley. URL: https://android.googlesource.com/platform/frameworks/volley Google.
[43] Square Open Source. Retrofit. URL: http://square.github.io/retrofit/.
[44] Paul Viola e Michael Jones. Rapid object detection using a boosted cascade of simple features. Em Computer Vision and Pattern Recognition, 2001. CVPR 2001. Proceedings of the 2001 IEEE Computer Society Conference on, volume 1, páginas I–511. IEEE, 2001.
[45] INSTRUCTURE TECH BLOG. Android async http clients: Volley vs retrofit. URL: http: //instructure.github.io/blog/2013/12/09/volley-vs-retrofit/.