[1]International Standardization Organization. ISO/IEC 29115-2011[S]. Information technology-Security techniques- Entity authentication assurance framework. ISO,2011
[2]International Standardization Organization. ISO/IEC 29003-2013[S]. Information technology-Security techniques- Identity proofing . ISO, 2013
[3] PaulA.Grassl, Michael E. Garcia, James L. Fenton. DRAFT NIST Special Publication 800-63-3 Digital identity guidelines [S]. US: National Institute of Standards and Technology, 2017
[4] Paul A. Grassi, James L. Fenton. DRAFT NIST Special Publication 800-63-3-A Digital Identity Guidelines: Enrollment and identity proofing requirements. US: National Institute of Standards and Technology, 2017
[5] Paul A. Grassi, James L. Fenton, Elaine M. Newton, Ray A. Perlner, Andrew R. Regenscheid, William E. Burr, Justin P. Richer. DRAFT NIST Special Publication 800-63B Digital Identity Guidelines: Authentication and Lifecycle Management[S]. US: National Institute of Standards and Technology, 2017
[6]CESG. Good Practice Guide No. 45,Identity Proofing and Verification of an Individual [S]. UK, 2014
[7] Authors U. STORK- Secure identity across borders linked. European Union GENERAL INFORMATION[J].
[8] The STORK 2.0 consortium .STORK- Secure identity across borders linked[EB/OL]. 2015[2017-06-01]. https://www.eid- stork.eu
[9] National e-authentication framework[EB/OL]. 2009[2017-06-01]. https://www.eid-stork.eu/ dmdocuments/public/NeAF-framework.pdf
[10] Standard on identity and credential assurance[EB/OL]. (2013-02-01)[2017-06-01].http://www.tbs-sct.gc.ca/pol/doc-eng.aspx?id=26776
[11] Ahmed A, Traore I. Detecting computer Intrusions using behavioral biometrics[C]//Proc of the 3rd Annual Conf on Privacy, Security and Trust. 2005: 91-98
[12] Pusaram M, Brodley C E. User re-authentication via mouse movements[C]//Proc of Workshop on Visualization & Data Mining for Computer Security. 2004: 1-8
[13] Active Authentication (AA)[EB/OL]. (2017-02-21)[2017-06-01]. https://opencatalog.darpa.mil/AA.html