{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,25]],"date-time":"2025-03-25T21:12:53Z","timestamp":1742937173636,"version":"3.40.3"},"publisher-location":"Cham","reference-count":15,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319453774"},{"type":"electronic","value":"9783319453781"}],"license":[{"start":{"date-parts":[[2016,1,1]],"date-time":"2016-01-01T00:00:00Z","timestamp":1451606400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2016,1,1]],"date-time":"2016-01-01T00:00:00Z","timestamp":1451606400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2016]]},"DOI":"10.1007\/978-3-319-45378-1_57","type":"book-chapter","created":{"date-parts":[[2016,9,8]],"date-time":"2016-09-08T05:04:15Z","timestamp":1473311055000},"page":"661-671","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Towards Generating a Unique Signature for Remote User by Keystrokes Dynamics"],"prefix":"10.1007","author":[{"given":"Puja","family":"Mukherjee","sequence":"first","affiliation":[]},{"given":"Rituparna","family":"Chaki","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2016,9,9]]},"reference":[{"issue":"3","key":"57_CR1","doi-asserted-by":"publisher","first-page":"263","DOI":"10.1016\/S0020-7373(85)80036-5","volume":"23","author":"D Umpires","year":"1985","unstructured":"Umpires, D., Williams, G.: Identity verification through keyboard characteristics. Int. J. Man-Mach. Stud. 23(3), 263\u2013273 (1985)","journal-title":"Int. J. Man-Mach. Stud."},{"key":"57_CR2","doi-asserted-by":"publisher","first-page":"8618","DOI":"10.1016\/j.eswa.2010.06.097","volume":"37","author":"PS Teh","year":"2010","unstructured":"Teh, P.S., Theo, A.B.J., Tee, C., Ong, T.S.: Keystroke dynamics in password authentication enhancement. Expert Syst. Appl. Int. J. 37, 8618\u20138627 (2010)","journal-title":"Expert Syst. Appl. Int. J."},{"issue":"4","key":"57_CR3","doi-asserted-by":"publisher","first-page":"351","DOI":"10.1016\/S0167-739X(99)00059-X","volume":"16","author":"F Monroe","year":"2000","unstructured":"Monroe, F., Rubin, A.D.: Keystroke dynamics as a biometric for authentication. Elsevier- Future Gener. Comput. Syst. 16(4), 351\u2013359 (2000)","journal-title":"Elsevier- Future Gener. Comput. Syst."},{"key":"57_CR4","doi-asserted-by":"crossref","unstructured":"Hong, Y., Deng, Y., Jai, A.K.: Keystroke dynamics for user authentication. In: IEEE Computer Society Conference on Computer Vision and Pattern Recognition Workshops (CVPRW), pp. 117\u2013123 (2012)","DOI":"10.1109\/CVPRW.2012.6239225"},{"key":"57_CR5","doi-asserted-by":"crossref","unstructured":"Revert, K., de Magadh\u00e3es, S.T., Santos, H.: Data mining a keystroke dynamics based biometrics database using rough sets. University of Technology of Compiegne (2005)","DOI":"10.1109\/EPIA.2005.341292"},{"issue":"2","key":"57_CR6","doi-asserted-by":"publisher","first-page":"1565","DOI":"10.1016\/j.asoc.2010.08.003","volume":"11","author":"M Karnana","year":"2011","unstructured":"Karnana, M., Akilab, M., Krishnarajc, N.: Biometric personal authentication using keystroke dynamics: a review. Appl. Soft Comput. 11(2), 1565\u20131573 (2011)","journal-title":"Appl. Soft Comput."},{"issue":"5","key":"57_CR7","doi-asserted-by":"publisher","first-page":"707","DOI":"10.1016\/j.dsp.2012.04.012","volume":"22","author":"X Wang","year":"2012","unstructured":"Wang, X., Fangxia, G., Jian-feng, M.: User authentication via keystroke dynamics based on difference subspace and slope correlation degree. Digit. Signal Process. 22(5), 707\u2013712 (2012)","journal-title":"Digit. Signal Process."},{"key":"57_CR8","unstructured":"Babaeizadeh, M., Bakhtiari, M., Maarof, M.A.: Authentication method through keystrokes measurement of mobile users in cloud environment. Int. J. Advance Soft Comp. Appl. 6(3) (2014)"},{"issue":"7","key":"57_CR9","doi-asserted-by":"publisher","first-page":"10649","DOI":"10.1016\/j.eswa.2009.02.075","volume":"36","author":"S-S Hwang","year":"2009","unstructured":"Hwang, S.-S., Lee, H.-J., Cho, S.: Improving authentication accuracy using artificial rhythms and cues for keystroke dynamics-based authentication. Expert Syst. Appl. ELSEVIER 36(7), 10649\u201310656 (2009)","journal-title":"Expert Syst. Appl. ELSEVIER"},{"issue":"4","key":"57_CR10","doi-asserted-by":"publisher","first-page":"289","DOI":"10.1080\/01449290512331321884","volume":"24","author":"K Kotani","year":"2005","unstructured":"Kotani, K., Horii, K.: Evaluation on a keystroke authentication system by keying force incorporated with temporal characteristics of keystroke dynamics. Behav. Inf. Technol. 24(4), 289\u2013302 (2005)","journal-title":"Behav. Inf. Technol."},{"issue":"1\u20132","key":"57_CR11","doi-asserted-by":"publisher","first-page":"85","DOI":"10.1016\/j.cose.2008.10.002","volume":"28","author":"SS Hwang","year":"2009","unstructured":"Hwang, S.S., Cho, S., Park, S.: Keystroke dynamics-based authentication for mobile devices. Comput. Secur. 28(1\u20132), 85\u201393 (2009)","journal-title":"Comput. Secur."},{"issue":"4","key":"57_CR12","doi-asserted-by":"publisher","first-page":"2149","DOI":"10.1007\/s11235-011-9538-9","volume":"52","author":"M Nauman","year":"2011","unstructured":"Nauman, M., Ali, T., Rauf, A.: Using trusted computing for privacy preserving keystroke-based authentication in smartphones. Telecommun. Syst. 52(4), 2149\u20132161 (2011)","journal-title":"Telecommun. Syst."},{"key":"57_CR13","doi-asserted-by":"crossref","unstructured":"Kaneko, Y., Kinpara, Y., Shiomi, Y.: A hamming distance-like filtering in keystroke dynamics. In: Proceedings of the 9th Annual International Conference on Privacy, Security and Trust (PST 2011), pp. 93\u201395 (2011)","DOI":"10.1109\/PST.2011.5971969"},{"key":"57_CR14","doi-asserted-by":"crossref","unstructured":"Lee, W., Choi, S.-S., Moon, B.-R.: An evolutionary keystroke authentication based on ellipsoidal hypothesis space. In: Proceedings of the 9th Annual Conference on Genetic and Evolutionary Computation, pp. 2090\u20132097 (2007)","DOI":"10.1145\/1276958.1277365"},{"key":"57_CR15","doi-asserted-by":"publisher","first-page":"816","DOI":"10.1109\/TSMCC.2008.2001696","volume":"38","author":"D Hosseinzadeh","year":"2011","unstructured":"Hosseinzadeh, D., Krishnan, S.: Gaussian mixture modelling of keystroke patterns for biometric applications. IEEE Trans. Syst. Man Cybern. Part C Appl. Rev. 38, 816\u2013826 (2011)","journal-title":"IEEE Trans. Syst. Man Cybern. Part C Appl. Rev."}],"container-title":["Lecture Notes in Computer Science","Computer Information Systems and Industrial Management"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-45378-1_57","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,6,25]],"date-time":"2024-06-25T08:10:47Z","timestamp":1719303047000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-319-45378-1_57"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016]]},"ISBN":["9783319453774","9783319453781"],"references-count":15,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-45378-1_57","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2016]]},"assertion":[{"value":"9 September 2016","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"CISIM","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"IFIP International Conference on Computer Information Systems and Industrial Management","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Vilnius","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Lithuania","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2016","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"14 September 2016","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"16 September 2016","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"15","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"cisim2016","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"This content has been made available to all.","name":"free","label":"Free to read"}]}}