{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,8]],"date-time":"2026-04-08T16:53:37Z","timestamp":1775667217257,"version":"3.50.1"},"reference-count":6,"publisher":"Elsevier BV","issue":"1","license":[{"start":{"date-parts":[[1988,1,1]],"date-time":"1988-01-01T00:00:00Z","timestamp":567993600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.elsevier.com\/tdm\/userlicense\/1.0\/"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["International Journal of Man-Machine Studies"],"published-print":{"date-parts":[[1988,1]]},"DOI":"10.1016\/s0020-7373(88)80053-1","type":"journal-article","created":{"date-parts":[[2008,8,14]],"date-time":"2008-08-14T04:40:20Z","timestamp":1218688820000},"page":"67-76","source":"Crossref","is-referenced-by-count":104,"title":["Verifying identity via keystroke characterstics"],"prefix":"10.1016","volume":"28","author":[{"given":"John","family":"Leggett","sequence":"first","affiliation":[]},{"given":"Glen","family":"Williams","sequence":"additional","affiliation":[]}],"member":"78","reference":[{"key":"10.1016\/S0020-7373(88)80053-1_bib1","series-title":"Rand Report R-2526-NSF","article-title":"Authentication by keystroke timing: some preliminary results","author":"Gaines","year":"1980"},{"key":"10.1016\/S0020-7373(88)80053-1_bib2","series-title":"Personal identification apparatus","author":"Garcia","year":"1986"},{"key":"10.1016\/S0020-7373(88)80053-1_bib3","series-title":"Authentication by keystroke time","author":"Knoll","year":"1986"},{"key":"10.1016\/S0020-7373(88)80053-1_bib4","series-title":"Human Factors in Management Information Systems","article-title":"Verification of user identity via keyboard characteristics","author":"Leggett","year":"1988"},{"key":"10.1016\/S0020-7373(88)80053-1_bib5","doi-asserted-by":"crossref","first-page":"263","DOI":"10.1016\/S0020-7373(85)80036-5","article-title":"Identity verification through keyboard characteristics","volume":"23","author":"Umphress","year":"1985","journal-title":"International Journal of Man-Machine Studies"},{"key":"10.1016\/S0020-7373(88)80053-1_bib6","first-page":"24","article-title":"Confidential information particularly vulnerable on LANs","author":"Warner","year":"1986","journal-title":"Infoworld"}],"container-title":["International Journal of Man-Machine Studies"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S0020737388800531?httpAccept=text\/xml","content-type":"text\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S0020737388800531?httpAccept=text\/plain","content-type":"text\/plain","content-version":"vor","intended-application":"text-mining"}],"deposited":{"date-parts":[[2018,12,26]],"date-time":"2018-12-26T07:57:00Z","timestamp":1545811020000},"score":1,"resource":{"primary":{"URL":"https:\/\/linkinghub.elsevier.com\/retrieve\/pii\/S0020737388800531"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[1988,1]]},"references-count":6,"journal-issue":{"issue":"1","published-print":{"date-parts":[[1988,1]]}},"alternative-id":["S0020737388800531"],"URL":"https:\/\/doi.org\/10.1016\/s0020-7373(88)80053-1","relation":{},"ISSN":["0020-7373"],"issn-type":[{"value":"0020-7373","type":"print"}],"subject":[],"published":{"date-parts":[[1988,1]]}}}