{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,11]],"date-time":"2026-03-11T13:21:39Z","timestamp":1773235299081,"version":"3.50.1"},"publisher-location":"Berlin, Heidelberg","reference-count":11,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"value":"9783540311119","type":"print"},{"value":"9783540316213","type":"electronic"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2005]]},"DOI":"10.1007\/11608288_85","type":"book-chapter","created":{"date-parts":[[2005,12,8]],"date-time":"2005-12-08T07:57:34Z","timestamp":1134028654000},"page":"640-646","source":"Crossref","is-referenced-by-count":30,"title":["Biometric Access Control Through Numerical Keyboards Based on Keystroke Dynamics"],"prefix":"10.1007","author":[{"given":"Ricardo N.","family":"Rodrigues","sequence":"first","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Glauco F. G.","family":"Yared","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Carlos R.","family":"do N. Costa","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Jo\u00e3o B. T.","family":"Yabu-Uti","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"F\u00e1bio","family":"Violaro","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Lee Luan","family":"Ling","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"297","reference":[{"issue":"4","key":"85_CR1","doi-asserted-by":"publisher","first-page":"351","DOI":"10.1016\/S0167-739X(99)00059-X","volume":"16","author":"F. Monrose","year":"1999","unstructured":"Monrose, F., Rubin, A.D.: Keystroke Dynamics as a Biometric for Authentication. Future Generation Computer Systems\u00a016(4), 351\u2013359 (1999)","journal-title":"Future Generation Computer Systems"},{"issue":"2","key":"85_CR2","doi-asserted-by":"publisher","first-page":"168","DOI":"10.1145\/75577.75582","volume":"33","author":"R. Joyce","year":"1990","unstructured":"Joyce, R., Gupta, G.: Identity authentication based on keystroke latencies. commun.\u00a033(2), 168\u2013176 (1990)","journal-title":"commun. ACM"},{"issue":"2","key":"85_CR3","doi-asserted-by":"publisher","first-page":"452","DOI":"10.1109\/21.87093","volume":"21","author":"D. Bleha","year":"1991","unstructured":"Bleha, D., Obaidat, M.: Dimensionality reduction and feature extraction applications in identifying computer users. IEEE Trans. Syst., Man, Cybern.\u00a021(2), 452\u2013456 (1991)","journal-title":"IEEE Trans. Syst., Man, Cybern."},{"key":"85_CR4","doi-asserted-by":"crossref","unstructured":"Lin, D.T.: Computer-access authentication with neural network based keystroke identity verification. In: Proc. Int. Conf. Neural Networks, vol.\u00a01, pp. 174\u2013178 (1997)","DOI":"10.1109\/ICNN.1997.611659"},{"issue":"2","key":"85_CR5","doi-asserted-by":"publisher","first-page":"261","DOI":"10.1109\/3477.558812","volume":"27","author":"M.S. Obaidat","year":"1997","unstructured":"Obaidat, M.S., Sadoun, B.: Verification of computer user using keystroke dynamics. IEEE Trans. Syst., Man, Cybern.\u00a027(2), 261\u2013269 (1997)","journal-title":"IEEE Trans. Syst., Man, Cybern."},{"key":"85_CR6","doi-asserted-by":"crossref","unstructured":"Monrose, F., Reiter, M.K., Wetzel, S.: Password hardening based on keystroke dynamics. In: Proc. 6th ACM Conf. Computer Security, Singapore (November 1999)","DOI":"10.1145\/319709.319720"},{"key":"85_CR7","doi-asserted-by":"crossref","unstructured":"Wong, F.W.M.H., Supian, A.S.M., Ismail, A.F., Kin, L.W., Soon, O.C.: Enhanced user authentication through typing biometrics with artificial neural network and k-nearest neighbor algorithm. In: Conf. Rec. 35th Asilomar Conf. Signals, Syst., comput., vol.\u00a02, pp. 911\u2013915 (2001)","DOI":"10.1109\/ACSSC.2001.987628"},{"key":"85_CR8","doi-asserted-by":"crossref","unstructured":"Ara\u00fajo, L.C.F., Sucupira Jr., L.H.R., Liz\u00e1rraga, M.G., Ling, L.L., Yabu-uti, J.B.T.: User authentication through typing biometrics features. IEEE Trans. on Signal Processing\u00a053(2) (February 2005)","DOI":"10.1109\/TSP.2004.839903"},{"key":"85_CR9","unstructured":"Duda, R.O., Hart, P.E., Stork, D.G.: Pattern Classification, 2nd edn., October 2000. Wiley-Interscience Publication, Hoboken (2000)"},{"key":"85_CR10","unstructured":"Cambridge University Engineering Departament, The HTK Book. Cambridge University, Cambridge (2002)"},{"key":"85_CR11","doi-asserted-by":"crossref","unstructured":"Ord, T., Furnell, S.M.: User authentication for keypad-based devices using keystroke analysis. In: Proc. Second International Network Conference (INC 2000), Plymouth, UK, pp. 263\u2013272 (2000)","DOI":"10.1108\/intr.2001.17211aaa.002"}],"container-title":["Lecture Notes in Computer Science","Advances in Biometrics"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/11608288_85","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,1,6]],"date-time":"2025-01-06T09:52:33Z","timestamp":1736157153000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/11608288_85"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2005]]},"ISBN":["9783540311119","9783540316213"],"references-count":11,"URL":"https:\/\/doi.org\/10.1007\/11608288_85","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2005]]}}}