{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,1]],"date-time":"2026-04-01T18:34:09Z","timestamp":1775068449442,"version":"3.50.1"},"publisher-location":"Berlin, Heidelberg","reference-count":11,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"value":"9783540311119","type":"print"},{"value":"9783540316213","type":"electronic"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2005]]},"DOI":"10.1007\/11608288_88","type":"book-chapter","created":{"date-parts":[[2005,12,8]],"date-time":"2005-12-08T07:57:34Z","timestamp":1134028654000},"page":"661-667","source":"Crossref","is-referenced-by-count":11,"title":["Enhancing Login Security Through the Use of Keystroke Input Dynamics"],"prefix":"10.1007","author":[{"given":"Kenneth","family":"Revett","sequence":"first","affiliation":[]},{"given":"S\u00e9rgio Tenreiro","family":"de Magalh\u00e3es","sequence":"additional","affiliation":[]},{"given":"Henrique M. D.","family":"Santos","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"issue":"5","key":"88_CR1","doi-asserted-by":"publisher","first-page":"25","DOI":"10.1109\/MSP.2004.81","volume":"2","author":"J. Yan","year":"2004","unstructured":"Yan, J., Blackwell, A.F., Anderson, R., Grant, A.: Password memorability and security: Empirical results. IEEE Security and Privacy\u00a02(5), 25\u201331 (2004)","journal-title":"IEEE Security and Privacy"},{"key":"88_CR2","unstructured":"Magalh\u00e3es, S.T., Santos, H.D.: An improved statistical keystroke dynamics algorithm. In: Proceedings of the IADIS MCCSIS (2005)"},{"key":"88_CR3","volume-title":"Java Card Technology for Smart Cards","author":"Z. Chen","year":"2000","unstructured":"Chen, Z.: Java Card Technology for Smart Cards. Addison Wesley, U.S.A 2000 (2000)"},{"key":"88_CR4","doi-asserted-by":"crossref","unstructured":"Ord, T., Furnell, S.M.: User authentication for keypad-based devices using keystroke analysis. In: Proceedings of the Second International Network Conference \u2013 INC 2000, Plymouth, U.K. (2000)","DOI":"10.1108\/intr.2001.17211aaa.002"},{"key":"88_CR5","unstructured":"Gaines, R., et al.: Authentication by keystroke timing: Some preliminary results. Rand Report R-256-NSF. Rand (1980)"},{"issue":"2","key":"88_CR6","doi-asserted-by":"publisher","first-page":"168","DOI":"10.1145\/75577.75582","volume":"33","author":"R. Joyce","year":"1990","unstructured":"Joyce, R., Gupta, G.: Identity authorization based on keystroke latencies. Communications of the ACM\u00a033(2), 168\u2013176 (1990)","journal-title":"Communications of the ACM"},{"key":"88_CR7","doi-asserted-by":"crossref","unstructured":"Monrose, F., et al.: Password Hardening based on Keystroke Dynamics. International Journal of Information Security (2001)","DOI":"10.1007\/s102070100006"},{"key":"88_CR8","doi-asserted-by":"crossref","unstructured":"Monrose, F., Rubin, A.D.: Authentication via Keystroke Dynamics. In: Proceedings of the Fourth ACM Conference on Computer and Communication Security. Zurich, Switzerland (1997)","DOI":"10.1145\/266420.266434"},{"key":"88_CR9","doi-asserted-by":"crossref","unstructured":"Monrose, F., Rubin, A.D.: Keystroke Dynamics as a Biometric for Authentication. Future Generation Computing Systems (FGCS) Journal: Security on the Web (2000)","DOI":"10.1016\/S0167-739X(99)00059-X"},{"issue":"5","key":"88_CR10","doi-asserted-by":"publisher","first-page":"40","DOI":"10.1109\/MSP.2004.89","volume":"2","author":"A. Peacock","year":"2004","unstructured":"Peacock, A., Ke, X., Wilkerson, M.: Typing Patterns: A Key to User Identification. IEEE. Security and Privacy\u00a02(5), 40\u201347 (2004)","journal-title":"IEEE. Security and Privacy"},{"key":"88_CR11","unstructured":"Revett, K., Khan, A.: Enhancing login security using keystroke hardening and keyboard gridding. In: Proceedings of the IADIS MCCSIS 2005 (2005)"}],"container-title":["Lecture Notes in Computer Science","Advances in Biometrics"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/11608288_88","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,4,11]],"date-time":"2020-04-11T12:03:21Z","timestamp":1586606601000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/11608288_88"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2005]]},"ISBN":["9783540311119","9783540316213"],"references-count":11,"URL":"https:\/\/doi.org\/10.1007\/11608288_88","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2005]]}}}