{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,9,29]],"date-time":"2025-09-29T08:05:07Z","timestamp":1759133107811},"publisher-location":"Berlin, Heidelberg","reference-count":13,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540745488"},{"type":"electronic","value":"9783540745495"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"DOI":"10.1007\/978-3-540-74549-5_62","type":"book-chapter","created":{"date-parts":[[2007,8,29]],"date-time":"2007-08-29T02:01:49Z","timestamp":1188352909000},"page":"584-593","source":"Crossref","is-referenced-by-count":33,"title":["Keystroke Dynamics in a General Setting"],"prefix":"10.1007","author":[{"given":"Rajkumar","family":"Janakiraman","sequence":"first","affiliation":[]},{"given":"Terence","family":"Sim","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"62_CR1","doi-asserted-by":"publisher","first-page":"111","DOI":"10.1049\/cp:19950480","volume-title":"IEEE Conf. on Security and Detection, European Convention","author":"S.J. Shepherd","year":"1995","unstructured":"Shepherd, S.J.: Continuous authentication by analysis of keyboard typing characteristics. In: IEEE Conf. on Security and Detection, European Convention, pp. 111\u2013114. IEEE Computer Society Press, Los Alamitos (1995)"},{"key":"62_CR2","unstructured":"Fry, E.B., Kress, J.E., Fountoukidis, D.L.: The Reading Teachers Book of Lists, 3rd edn."},{"key":"62_CR3","volume-title":"Proceedings of the 6th ACM Conference on Computer and Communications Security","author":"F. Monrose","year":"1999","unstructured":"Monrose, F., Reiter, M.K., Wetzel, S.: Password hardening based on keystroke dynamics. In: Proceedings of the 6th ACM Conference on Computer and Communications Security, ACM Press, New York (1999)"},{"key":"62_CR4","doi-asserted-by":"crossref","unstructured":"Rodrigues, R.N., Yared, G.F.G., Costa, C.R.D., Yabu Uti, J.B.T., Violaro, F., Ling, L.L.: Biometric Access Control Through Numerical Keyboards Based on Keystroke Dynamics. In: International Conference of Biometrics, pp. 640\u2013646 (2006)","DOI":"10.1007\/11608288_85"},{"key":"62_CR5","series-title":"Lecture Notes in Computer Science","first-page":"441","volume-title":"Advances in Computer Systems Architecture","author":"S. Kumar","year":"2005","unstructured":"Kumar, S., Sim, T., Janakiraman, R., Zhang, S.: Using Continuous Biometric Verification to Protect Interactive Login Sessions. In: Srikanthan, T., Xue, J., Chang, C.-H. (eds.) ACSAC 2005. LNCS, vol.\u00a03740, pp. 441\u2013450. Springer, Heidelberg (2005)"},{"issue":"2","key":"62_CR6","doi-asserted-by":"publisher","first-page":"168","DOI":"10.1145\/75577.75582","volume":"33","author":"R. Joyce","year":"1990","unstructured":"Joyce, R., Gupta, G.: Identity authentication based on keystroke latencies. Communications of the ACM\u00a033(2), 168\u2013176 (1990)","journal-title":"Communications of the ACM"},{"key":"62_CR7","doi-asserted-by":"publisher","first-page":"39","DOI":"10.1109\/CVPRW.2006.115","volume-title":"Proceedings of the 2006 Conference on Computer Vision and Pattern Recognition Workshop","author":"M. Villani","year":"2006","unstructured":"Villani, M., Tappert, C., Ngo, G., Simone, J., St. Fort, H., Cha, S.: Keystroke Biometric Recognition Studies on Long-Text Input under Ideal and Application-Oriented Conditions. In: Proceedings of the 2006 Conference on Computer Vision and Pattern Recognition Workshop, p. 39. IEEE Computer Society, Washington (2006)"},{"key":"62_CR8","unstructured":"Rao, B.: Continuous Keystroke Biometric System M.S. thesis, Media Arts and Technology, UCSB (2005)"},{"issue":"6","key":"62_CR9","doi-asserted-by":"publisher","first-page":"859","DOI":"10.1016\/S0020-7373(05)80165-8","volume":"35","author":"J. Leggett","year":"1991","unstructured":"Leggett, J., Williams, G., Usnick, M., Longnecker, M.: Dynamic identity verification via keystroke characteristics. Int. J. Man-Mach. Stud.\u00a035(6), 859\u2013870 (1991)","journal-title":"Int. J. Man-Mach. Stud."},{"key":"62_CR10","unstructured":"Obaidat, M.S., Sadoun, B.: Keystroke Dynamics Based Authentication. Ch. 10, Textbook (1998), http:\/\/web.cse.msu.edu\/~cse891\/Sect601\/textbook\/10.pdf"},{"key":"62_CR11","volume-title":"Pattern Classification","author":"R. Duda","year":"2000","unstructured":"Duda, R., Hart, P., Stork, D.: Pattern Classification, 2nd edn. John Wiley and Sons, Chichester (2000)","edition":"2"},{"issue":"3","key":"62_CR12","doi-asserted-by":"publisher","first-page":"312","DOI":"10.1145\/1085126.1085129","volume":"8","author":"D. Gunetti","year":"2005","unstructured":"Gunetti, D., Picardi, C.: Keystroke analysis of free text. ACM Transactions Information Systems Security\u00a08(3), 312\u2013347 (2005)","journal-title":"ACM Transactions Information Systems Security"},{"key":"62_CR13","volume-title":"Proceedings of the 12th IEEE Signal Processing and Communications Applications Conference","author":"A.K. Jain","year":"2004","unstructured":"Jain, A.K.: Biometric recognition: how do I know who you are? In: Proceedings of the 12th IEEE Signal Processing and Communications Applications Conference, IEEE Computer Society Press, Los Alamitos (2004)"}],"container-title":["Lecture Notes in Computer Science","Advances in Biometrics"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-540-74549-5_62.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,4,27]],"date-time":"2021-04-27T06:23:38Z","timestamp":1619504618000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-540-74549-5_62"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[null]]},"ISBN":["9783540745488","9783540745495"],"references-count":13,"URL":"https:\/\/doi.org\/10.1007\/978-3-540-74549-5_62","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[]}}