{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,4]],"date-time":"2024-09-04T21:42:47Z","timestamp":1725486167273},"publisher-location":"Berlin, Heidelberg","reference-count":21,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540426103"},{"type":"electronic","value":"9783540454182"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2001]]},"DOI":"10.1007\/3-540-45418-7_11","type":"book-chapter","created":{"date-parts":[[2007,6,3]],"date-time":"2007-06-03T17:08:09Z","timestamp":1180890489000},"page":"124-134","source":"Crossref","is-referenced-by-count":2,"title":["iButton Enrolment and Verification Requirements for the Pressure Sequence Smartcard Biometric"],"prefix":"10.1007","author":[{"given":"Neil J.","family":"Henderson","sequence":"first","affiliation":[]},{"given":"Neil M.","family":"White","sequence":"additional","affiliation":[]},{"given":"Pieter H.","family":"Hartel","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2001,9,11]]},"reference":[{"issue":"12","key":"11_CR1","doi-asserted-by":"publisher","first-page":"1217","DOI":"10.1109\/34.62613","volume":"12","author":"S. Bleha","year":"1990","unstructured":"S. Bleha, C. Slivinsky, and B. Hussien, Computer access security systems using keystroke dynamics, IEEE Transactions on Pattern Analysis and Machine Intelligence 12 (1990), no. 12, 1217\u20131222.","journal-title":"IEEE Transactions on Pattern Analysis and Machine Intelligence"},{"key":"11_CR2","doi-asserted-by":"publisher","first-page":"900","DOI":"10.1109\/21.256563","volume":"23","author":"S. A. Bleha","year":"1993","unstructured":"S. A. Bleha and M. S. Obaidat, Computer user verification using the perceptron algorithm, IEEE Transactions on Systems, Man and Cybernetics 23 (1993), no. 3, 900\u2013902.","journal-title":"IEEE Transactions on Systems, Man and Cybernetics"},{"key":"11_CR3","doi-asserted-by":"publisher","first-page":"999","DOI":"10.1006\/imms.1993.1092","volume":"39","author":"M. Brown","year":"1993","unstructured":"M. Brown and S. J. Rogers, User identification via keystroke characteristics of typed names using neural networks, International Journal of Man-Machine Studies 39 (1993), 999\u20131014.","journal-title":"International Journal of Man-Machine Studies"},{"key":"11_CR4","doi-asserted-by":"publisher","first-page":"27","DOI":"10.1037\/h0073806","volume":"4","author":"W. L. Bryan","year":"1897","unstructured":"W. L. Bryan and N. Harter, Studies in the physiology and psychology of the telegraphic language, Psychological Review 4 (1897), 27\u201353.","journal-title":"Psychological Review"},{"unstructured":"J. Crenshaw, Integer square roots, Embedded Systems Programming (1998), no. 2.","key":"11_CR5"},{"unstructured":"J. D. Garcia, Personal identification apparatus, US Patent 4 621 334, November 1986.","key":"11_CR6"},{"doi-asserted-by":"crossref","unstructured":"G. Hachez, F. Koeunne, and J-J. Quisquater, Biometrics, access control, smartcards: A not so simple combination, Smart Card Research and Advanced Applications (Bristol, UK), IFIP\/TC8 Fourth Working Conference on Smart Card Research and Advanced Applications, Kluwer Academic Publishers, September 2000, ISBN: 0-7923-7953-5, pp. 273\u2013288.","key":"11_CR7","DOI":"10.1007\/978-0-387-35528-3_16"},{"doi-asserted-by":"crossref","unstructured":"N. J. Henderson and P. H. Hartel, \u2019pressure sequence\u2019-a novel method of protecting smart cards, Smart Card Research and Advanced Applications (Bristol, UK), IFIP\/TC8 Fourth Working Conference on Smart Card Research and Advanced Applications, Kluwer Academic Publishers, September 2000, ISBN: 0-7923-7953-5, pp. 241\u2013256.","key":"11_CR8","DOI":"10.1007\/978-0-387-35528-3_14"},{"key":"11_CR9","volume-title":"Biometrics: Personal identification in networked society","author":"A. Jain","year":"1998","unstructured":"A. Jain, R. Bolle, and S. Pankanti, Biometrics: Personal identification in networked society, Kluwer, Boston, 1998, ISBN 0792383451."},{"issue":"2","key":"11_CR10","doi-asserted-by":"publisher","first-page":"168","DOI":"10.1145\/75577.75582","volume":"33","author":"R. Joyce","year":"1990","unstructured":"R. Joyce and G. Gupta, Identity authentication based on keystroke dynamics, Communications of the ACM 33 (1990), no. 2, 168\u2013176.","journal-title":"Communications of the ACM"},{"unstructured":"E. R. Kandel, Principles of neural science, Elsevier, North Holland, 1981.","key":"11_CR11"},{"key":"11_CR12","doi-asserted-by":"publisher","first-page":"67","DOI":"10.1016\/S0020-7373(88)80053-1","volume":"28","author":"J. Leggett","year":"1988","unstructured":"J. Leggett and G. Williams, Verifying identity through keystroke characteristics, International Journal of Man-Machine Studies 28 (1988), 67\u201376.","journal-title":"International Journal of Man-Machine Studies"},{"key":"11_CR13","doi-asserted-by":"publisher","first-page":"351","DOI":"10.1016\/S0167-739X(99)00059-X","volume":"16","author":"F. Monrose","year":"2000","unstructured":"F. Monrose and A. D. Rubin, Keystroke dynamics as a biometric for authentication, Future Generation Computer Systems 16 (2000), 351\u2013359.","journal-title":"Future Generation Computer Systems"},{"issue":"2","key":"11_CR14","doi-asserted-by":"publisher","first-page":"261","DOI":"10.1109\/3477.558812","volume":"27","author":"M. S. Obaidat","year":"1997","unstructured":"M. S. Obaidat and B. Sadoun, Verification of computer users using keystroke dynamics, IEEE Transactions on Systems, Man and Cybernetics-Part B-Cybernetics 27 (1997), no. 2, 261\u2013269.","journal-title":"IEEE Transactions on Systems, Man and Cybernetics-Part B-Cybernetics"},{"key":"11_CR15","volume-title":"Numerical recipies in c","author":"W. H. Press","year":"1993","unstructured":"W. H. Press, S. A. Teukolsky, W. T. Vetterling, and B. P. Flannery, Numerical recipies in c, Cambridge University Press, Cambridge, United Kingdom, 1993."},{"issue":"2","key":"11_CR16","doi-asserted-by":"publisher","first-page":"236","DOI":"10.1109\/3468.661150","volume":"28","author":"J. A. Robinson","year":"1998","unstructured":"J. A. Robinson, V. M. Liang, J. A. M. Chambers, and C. L. MacKenzie, Computer user verification using login string keystroke dynamics, IEEE Transactions on Systems, Man and Cybernetics-Part A-Systems and Humans 28 (1998), no. 2, 236\u2013241.","journal-title":"IEEE Transactions on Systems, Man and Cybernetics-Part A-Systems and Humans"},{"issue":"1","key":"11_CR17","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1016\/S0364-0213(82)80004-9","volume":"6","author":"D. E. Rummelhart","year":"1982","unstructured":"D. E. Rummelhart and D. A. Norman, Simulating a skilled typist: A study of skilled cognitive-motor performance, Cognitive Science 6 (1982), no. 1, 1\u201336.","journal-title":"Cognitive Science"},{"unstructured":"Dallas Semiconductor, http:\/\/www.ibutton.com\/ , March 2001.","key":"11_CR18"},{"unstructured":"Siemens, http:\/\/www.silicon-trust.com\/ , March 2001.","key":"11_CR19"},{"key":"11_CR20","doi-asserted-by":"publisher","first-page":"67","DOI":"10.1016\/S0020-7373(85)80036-5","volume":"23","author":"D. Umphress","year":"1985","unstructured":"D. Umphress and G. Williams, Identity verification through keyboard characteristics, International Journal of Man-Machine Studies 23 (1985), 67\u201376.","journal-title":"International Journal of Man-Machine Studies"},{"unstructured":"J. R. Young and W. Hammond, Method and apparatus for verifying an individual\u2019s identity, US Patent 4 805 222, February 1989.","key":"11_CR21"}],"container-title":["Lecture Notes in Computer Science","Smart Card Programming and Security"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/3-540-45418-7_11","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,4,28]],"date-time":"2019-04-28T12:57:51Z","timestamp":1556456271000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/3-540-45418-7_11"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2001]]},"ISBN":["9783540426103","9783540454182"],"references-count":21,"URL":"https:\/\/doi.org\/10.1007\/3-540-45418-7_11","relation":{},"ISSN":["0302-9743"],"issn-type":[{"type":"print","value":"0302-9743"}],"subject":[],"published":{"date-parts":[[2001]]}}}