{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,28]],"date-time":"2025-03-28T07:20:14Z","timestamp":1743146414391,"version":"3.40.3"},"publisher-location":"Boston, MA","reference-count":7,"publisher":"Springer US","isbn-type":[{"type":"print","value":"9781441959058"},{"type":"electronic","value":"9781441959065"}],"license":[{"start":{"date-parts":[[2011,1,1]],"date-time":"2011-01-01T00:00:00Z","timestamp":1293840000000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2011,1,1]],"date-time":"2011-01-01T00:00:00Z","timestamp":1293840000000},"content-version":"vor","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2011]]},"DOI":"10.1007\/978-1-4419-5906-5_783","type":"book-chapter","created":{"date-parts":[[2011,10,27]],"date-time":"2011-10-27T13:52:05Z","timestamp":1319723525000},"page":"688-691","source":"Crossref","is-referenced-by-count":1,"title":["Keyboard Dynamics"],"prefix":"10.1007","author":[{"given":"Mitchell A.","family":"Thornton","sequence":"first","affiliation":[]}],"member":"297","reference":[{"issue":"4","key":"783_CR1_783","doi-asserted-by":"crossref","first-page":"345","DOI":"10.1037\/h0073117","volume":"6","author":"WL Bryan","year":"1989","unstructured":"Bryan WL, Harter N (1989) Studies on the telegraphic language: the acquisition of a hierarchy of habits. Psychol Rev 6(4):345\u2013375","journal-title":"Psychol Rev"},{"key":"783_CR2_783","unstructured":"Young JR, Hammon RW (1989) Method and apparatus for verifying an individual\u2019s identity. US Patent 4,805,222, 14 Feb\u00a01989"},{"key":"783_CR3_783","unstructured":"Spillane R (1975) Keyboard apparatus for personal identification. Technical report, IBM Technical Disclosure Bulletin"},{"key":"783_CR4_783","doi-asserted-by":"crossref","first-page":"117","DOI":"10.1016\/B978-0-12-665960-3.50011-6","volume-title":"Information processing in motor control and learning","author":"S Sternberg","year":"1978","unstructured":"Sternberg S, Monsell S, Knoll R, Wright C (1978) The latency and duration of rapid movement sequences: comparisons of speech and typing. In: Stelmach GE (ed) Information processing in motor control and learning. Academic, New York, pp 117\u2013152"},{"key":"783_CR5_783","volume-title":"Design and implementation of a novel behavioral biometric for user authentication","author":"JD Allen","year":"2010","unstructured":"Allen JD, Howard J (2010) Design and implementation of a novel behavioral biometric for user authentication. In: Proceedings of the Society for Design and Process Science"},{"key":"783_CR6_783","unstructured":"Gaines R, Lisowski W, Press S, Shapiro N (1980) Authentication by keystroke timing: some preliminary results, Rand Report R-256-NSF, Rand Corporation"},{"issue":"12","key":"783_CR7_783","doi-asserted-by":"publisher","first-page":"1217","DOI":"10.1109\/34.62613","volume":"12","author":"S Bleha","year":"1990","unstructured":"Bleha S, Slivinsky C, Hussien B (1990) Computer-access security systems using keystroke dynamics. IEEE Trans Pattern Anal Mach Intell 12(12):1217\u20131222","journal-title":"IEEE Trans Pattern Anal Mach Intell"}],"container-title":["Encyclopedia of Cryptography and Security"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-1-4419-5906-5_783","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,4,14]],"date-time":"2024-04-14T06:11:51Z","timestamp":1713075111000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-1-4419-5906-5_783"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2011]]},"ISBN":["9781441959058","9781441959065"],"references-count":7,"URL":"https:\/\/doi.org\/10.1007\/978-1-4419-5906-5_783","relation":{},"subject":[],"published":{"date-parts":[[2011]]}}}