{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T21:34:09Z","timestamp":1725572049497},"publisher-location":"Berlin, Heidelberg","reference-count":5,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540666820"},{"type":"electronic","value":"9783540479420"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[1999]]},"DOI":"10.1007\/978-3-540-47942-0_18","type":"book-chapter","created":{"date-parts":[[2010,12,16]],"date-time":"2010-12-16T23:16:22Z","timestamp":1292541382000},"page":"216-229","source":"Crossref","is-referenced-by-count":2,"title":["User Identification System Based on Biometrics for Keystroke"],"prefix":"10.1007","author":[{"given":"Kazumasa","family":"Omote","sequence":"first","affiliation":[]},{"given":"Eiji","family":"Okamoto","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"18_CR1","doi-asserted-by":"crossref","unstructured":"Feinstein, A.R.: Multivariable Analysis, An Introduction. Yale University (1996)","DOI":"10.2307\/j.ctt2250wks"},{"key":"18_CR2","doi-asserted-by":"publisher","first-page":"168","DOI":"10.1145\/75577.75582","volume":"33","author":"R. Joyce","year":"1990","unstructured":"Joyce, R., Gupta, G.: Identity Authentication Based on Keystroke Latencies. Communications of the ACM\u00a033, 168\u2013176 (1990)","journal-title":"Communications of the ACM"},{"key":"18_CR3","first-page":"1198","volume":"34","author":"M. Kasukawa","year":"1993","unstructured":"Kasukawa, M., Kakuda, H., Mori, Y.: An Identity Authentication Method Based on Arpeggio Keystrokes. Transaction of IPSJ\u00a034, 1198\u20131205 (1993)","journal-title":"Transaction of IPSJ"},{"key":"18_CR4","doi-asserted-by":"crossref","unstructured":"Monrose, F., Rubin, A.: Authentication via Keystroke Dynamics. In: 4th ACM Conference on Computer and Communcations Security (1998)","DOI":"10.1145\/266420.266434"},{"key":"18_CR5","unstructured":"Omote, K., Okamoto, E.: User Identification Schemes Using Biometrics of Key-stroke. In: Proceedings of CSS 1998, pp. 213\u2013218 (1998)"}],"container-title":["Lecture Notes in Computer Science","Information and Communication Security"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-540-47942-0_18","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,6,7]],"date-time":"2019-06-07T00:46:16Z","timestamp":1559868376000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-540-47942-0_18"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[1999]]},"ISBN":["9783540666820","9783540479420"],"references-count":5,"URL":"https:\/\/doi.org\/10.1007\/978-3-540-47942-0_18","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[1999]]}}}