{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,8,2]],"date-time":"2025-08-02T19:04:15Z","timestamp":1754161455389,"version":"3.41.2"},"reference-count":35,"publisher":"Emerald","issue":"2","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2010,6,8]]},"abstract":"<jats:sec>\n                  <jats:title>Purpose<\/jats:title>\n                  <jats:p>In keystroke-based authentication systems, an input device to enter a password is needed. Users are verified by checking the validity of the password and typing characteristics. However, some devices have no standard desktop keyboard such as personal digital assistants and mobile phones. With these types of electronics, the system cannot successfully work in the authentication phase while the registration process is implemented based on a computer keyboard. This results in a reduction of system portability. The purpose of this paper is to employ the rhythm clicked by a mouse as another identifiable factor to authenticate a user's identity.<\/jats:p>\n               <\/jats:sec>\n               <jats:sec>\n                  <jats:title>Design\/methodology\/approach<\/jats:title>\n                  <jats:p>Mouse click can be replaced by a stylus and fingers on touch screens or numeral buttons on mobile phones. A total of 25 users participated and the click data are based on time instances of pressing and releasing the mouse button, which are captured while the user clicks a rhythm. Three features are calculated using these click data, and a reasonable amount of results with neural networks and other classifiers shows the click characteristics are able to function as another identifiable factor.<\/jats:p>\n               <\/jats:sec>\n               <jats:sec>\n                  <jats:title>Findings<\/jats:title>\n                  <jats:p>A reasonable amount of results with neural networks and other classifiers shows the click characteristics are able to function as another identifiable factor.<\/jats:p>\n               <\/jats:sec>\n               <jats:sec>\n                  <jats:title>Originality\/value<\/jats:title>\n                  <jats:p>The paper presents a personalized rhythm click-based authentication system.<\/jats:p>\n               <\/jats:sec>","DOI":"10.1108\/09685221011048328","type":"journal-article","created":{"date-parts":[[2010,6,5]],"date-time":"2010-06-05T07:04:59Z","timestamp":1275721499000},"page":"72-85","source":"Crossref","is-referenced-by-count":10,"title":["A personalized rhythm click-based authentication system"],"prefix":"10.1108","volume":"18","author":[{"given":"Ting-Yi","family":"Chang","sequence":"first","affiliation":[{"name":"Graduate Institute of e-Learning, National Changhua University of Education, Changhua City, Taiwan, Republic of China"}]},{"given":"Yu-Ju","family":"Yang","sequence":"additional","affiliation":[{"name":"Graduate Institute of e-Learning, National Changhua University of Education, Changhua City, Taiwan, Republic of China"}]},{"given":"Chun-Cheng","family":"Peng","sequence":"additional","affiliation":[{"name":"Department of Computer Science and Information Systems, Birkbeck, University of London, London, UK"}]}],"member":"140","reference":[{"issue":"3","key":"2025072819513682800_b1","doi-asserted-by":"crossref","first-page":"165","DOI":"10.1109\/TDSC.2007.70207","article-title":"A new biometric technology based on mouse dynamics","volume":"4","author":"Ahmed","year":"2007","journal-title":"IEEE Transactions on Dependable and Secure Computing"},{"issue":"2","key":"2025072819513682800_b2","doi-asserted-by":"crossref","first-page":"851","DOI":"10.1109\/TSP.2004.839903","article-title":"User authentication through typing biometrics features","volume":"53","author":"Ara\u00fajo","year":"2005","journal-title":"IEEE Transactions on Signal Processing"},{"key":"2025072819513682800_b3","doi-asserted-by":"crossref","unstructured":"Azevedo, G.L.F.\n          , Cavalcanti, G.D.C. and Filho, E.C.B.C. (2007), \u201cHybrid solution for the feature selection in personal identification problems through keystroke dynamics\u201d, IEEE International Joint Conference on Neural Networks, Orlando, FL, pp. 1947-52.","DOI":"10.1109\/IJCNN.2007.4371256"},{"issue":"4","key":"2025072819513682800_b4","doi-asserted-by":"crossref","first-page":"367","DOI":"10.1145\/581271.581272","article-title":"User authentication through keystroke dynamics","volume":"5","author":"Bergadano","year":"2002","journal-title":"ACM Transactions on Information and System Security"},{"issue":"2","key":"2025072819513682800_b5","doi-asserted-by":"crossref","first-page":"452","DOI":"10.1109\/21.87093","article-title":"Dimensionality reduction and feature extraction applications in identifying computer users","volume":"21","author":"Bleha","year":"1991","journal-title":"IEEE Transactions on System, Man, and Cybernetics"},{"issue":"3","key":"2025072819513682800_b6","doi-asserted-by":"crossref","first-page":"900","DOI":"10.1109\/21.256563","article-title":"Computer users verification using the perceptron algorithm","volume":"23","author":"Bleha","year":"1993","journal-title":"IEEE Transactions on System, Man, and Cybernetics"},{"issue":"12","key":"2025072819513682800_b7","doi-asserted-by":"crossref","first-page":"1217","DOI":"10.1109\/34.62613","article-title":"Computer-access security systems using keystroke dynamics","volume":"12","author":"Bleha","year":"1990","journal-title":"IEEE Transactions on Pattern Analysis and Machine Intelligence"},{"issue":"4","key":"2025072819513682800_b8","doi-asserted-by":"crossref","first-page":"333","DOI":"10.1049\/iet-spr.2008.0171","article-title":"User authentication using keystroke dynamics for cellular phones","volume":"3","author":"Campisi","year":"2009","journal-title":"IET Signal Processing"},{"issue":"5-6","key":"2025072819513682800_b9","doi-asserted-by":"crossref","first-page":"703","DOI":"10.1016\/j.camwa.2004.11.007","article-title":"Simple authenticated key agreement and protected password change protocol","volume":"9","author":"Chang","year":"2005","journal-title":"Computers & Mathematics with Applications"},{"key":"2025072819513682800_b10","doi-asserted-by":"crossref","unstructured":"Choras, M.\n           and Mroczkowski, P. (2007), \u201cKeystroke dynamics for biometrics identification\u201d, Adaptive and Natural Computing Algorithm, Lecture Notes in Computer Science, Vol. 4432, Springer, Berlin, pp. 424-31.","DOI":"10.1007\/978-3-540-71629-7_48"},{"issue":"1","key":"2025072819513682800_b11","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1007\/s10207-006-0006-6","article-title":"Authenticating mobile phone users using keystroke analysis","volume":"6","author":"Clarke","year":"2006","journal-title":"International Journal of Information Security"},{"issue":"4","key":"2025072819513682800_b12","doi-asserted-by":"crossref","first-page":"161","DOI":"10.1108\/09685220310489526","article-title":"Keystroke dynamics on a mobile handset: a feasibility study","volume":"11","author":"Clarke","year":"2003","journal-title":"Information Management & Computer Security"},{"issue":"6","key":"2025072819513682800_b13","doi-asserted-by":"crossref","first-page":"38","DOI":"10.1109\/64.642960","article-title":"Enhanced password authentication through fuzzy logic","volume":"12","author":"de Ru","year":"1997","journal-title":"IEEE Expert: Intelligent Systems and their Applications"},{"key":"2025072819513682800_b14","doi-asserted-by":"crossref","unstructured":"Gunetti, D.\n          , Picardi, C. and Ruffo, G. (2005), \u201cKeystroke analysis of different languages: a case study\u201d, Advances in Intelligent Data Analysis VI, Lecture Notes in Computer Science, Vol. 3646, Springer, Berlin, pp. 133-44.","DOI":"10.1007\/11552253_13"},{"key":"2025072819513682800_b15","unstructured":"Hagan, M.T.\n          , Demuth, H.B. and Beale, M. (1997), Neural Network Design, PWS, Boston, MA."},{"key":"2025072819513682800_b16","doi-asserted-by":"crossref","unstructured":"Haider, S.\n          , Abbas, A. and Zaidi, A.K. (2000), \u201cA multi-technique approach for user identification through keystroke dynamics\u201d, IEEE International Conference on System, Man, and Cybernetics, Nashville, TN, pp. 1336-41.","DOI":"10.1109\/ICSMC.2000.886039"},{"key":"2025072819513682800_b17","doi-asserted-by":"crossref","unstructured":"Hayashi, K.\n          , Okamoto, E. and Mambo, M. (1997), \u201cProposal of user identification scheme using mouse\u201d, Proceedings of the First International Conference on Information and Communication Security, Lecture Notes in Computer Science, Vol. 1334, Springer, Berlin, pp. 144-8.","DOI":"10.1007\/BFb0028470"},{"key":"2025072819513682800_b18","doi-asserted-by":"crossref","unstructured":"Hocquet, S.\n          , Ramel, J.Y. and Cardot, H. (2007), \u201cUser classification for keystroke dynamics authentication\u201d, Advances in Biometrics, Lecture Notes in Computer Science, Vol. 4642, Springer, Berlin, pp. 531-9.","DOI":"10.1007\/978-3-540-74549-5_56"},{"issue":"6","key":"2025072819513682800_b19","doi-asserted-by":"crossref","first-page":"816","DOI":"10.1109\/TSMCC.2008.2001696","article-title":"Gaussian mixture modeling of keystroke patterns for biometric applications","volume":"38","author":"Hosseinzadeh","year":"2008","journal-title":"IEEE Transactions on Systems, Man, and Cybernetics-Part C: Applications and Reviews"},{"key":"2025072819513682800_b20","doi-asserted-by":"crossref","unstructured":"Hourcade, J.P.\n          , Crowther, M. and Hunt, L. (2007), \u201cDoes mouse size affect study and evaluation results?: a study comparing preschool children's performance with small and regular-sized mice\u201d, Proceedings of the 6th International Conference on Interaction Design and Children, ACM New York, NY, USA, pp. 109-16.","DOI":"10.1145\/1297277.1297300"},{"key":"2025072819513682800_b21","doi-asserted-by":"crossref","unstructured":"Hu, J.\n          , Gingrich, D. and Sentosa, A. (2008), \u201cA k-nearest neighbor approach for user authentication through biometric keystroke dynamics\u201d, IEEE International Conference on Communications, Beijing, pp. 1556-60.","DOI":"10.1109\/ICC.2008.301"},{"key":"2025072819513682800_b22","unstructured":"Jain, A.K.\n          , Bolle, R. and Pankanti, S. (2002), Biometrics: Personal Identification in Networked Society, Kluwer Academic, Dordrecht."},{"issue":"1-2","key":"2025072819513682800_b23","doi-asserted-by":"crossref","first-page":"3","DOI":"10.1016\/j.cose.2008.02.001","article-title":"Improvement of keystroke data quality through artificial rhythms and cues","volume":"27","author":"Kang","year":"2008","journal-title":"Computer & Security"},{"issue":"4","key":"2025072819513682800_b24","doi-asserted-by":"crossref","first-page":"300","DOI":"10.1016\/j.cose.2006.11.006","article-title":"Retraining a keystroke dynamics-based authenticator with impostor patterns","volume":"26","author":"Lee","year":"2006","journal-title":"Computers & Security"},{"key":"2025072819513682800_b25","doi-asserted-by":"crossref","unstructured":"Martono, W.\n          , Ali, H. and Salami, M.J.E. (2007), \u201cKeystroke pressure-based typing biometrics authentication system using support vector machines\u201d, Computational Science and its Applications, Lecture Notes in Computer Science, Vol. 4706, Springer, Berlin, pp. 85-93.","DOI":"10.1007\/978-3-540-74477-1_8"},{"issue":"4","key":"2025072819513682800_b26","doi-asserted-by":"crossref","first-page":"351","DOI":"10.1016\/S0167-739X(99)00059-X","article-title":"Keystroke dynamics as a biometric for authentication","volume":"16","author":"Monrose","year":"2000","journal-title":"Future Generation Computer Systems"},{"issue":"5","key":"2025072819513682800_b27","doi-asserted-by":"crossref","first-page":"806","DOI":"10.1109\/21.293498","article-title":"A multilayer neural network system for computer access security","volume":"24","author":"Obaidat","year":"1994","journal-title":"IEEE Transactions on System, Man, and Cybernetics"},{"issue":"2","key":"2025072819513682800_b28","doi-asserted-by":"crossref","first-page":"261","DOI":"10.1109\/3477.558812","article-title":"Verification of computer users using keystroke dynamics","volume":"27","author":"Obaidat","year":"1997","journal-title":"IEEE Transactions on System, Man, and Cybernetics-Part B: Cybernetics"},{"key":"2025072819513682800_b29","doi-asserted-by":"crossref","unstructured":"Revett, K.\n          , de Magalh\u00e1es, S.T. and Santos, H. (2005a), \u201cData mining a keystroke dynamics based biometrics database using rough sets\u201d, IEEE Portuguese Conference on Artificial Intelligence, pp. 188-91.","DOI":"10.1109\/EPIA.2005.341292"},{"key":"2025072819513682800_b30","doi-asserted-by":"crossref","unstructured":"Revett, K.\n          , de Magalh\u00e1es, S.T. and Santos, H.M.D. (2005b), \u201cEnhancing login security through the use of keystroke input dynamics\u201d, Advances in Biometrics, Lecture Notes in Computer Science, Springer, Berlin, pp. 661-7.","DOI":"10.1007\/11608288_88"},{"issue":"2","key":"2025072819513682800_b31","doi-asserted-by":"crossref","first-page":"236","DOI":"10.1109\/3468.661150","article-title":"Computer users verification using login string keystroke dynamics","volume":"28","author":"Robinson","year":"1998","journal-title":"IEEE Transactions on System, Man, and Cybernetics-Part A: Systems and Humans"},{"issue":"4","key":"2025072819513682800_b32","doi-asserted-by":"crossref","first-page":"826","DOI":"10.1109\/TSMCB.2005.846648","article-title":"A parallel decision tree-based method for user authentication based on keystroke patterns","volume":"35","author":"Sheng","year":"2005","journal-title":"IEEE Transactions on System, Man, and Cybernetics-Part B: Cybernetics"},{"key":"2025072819513682800_b33","doi-asserted-by":"crossref","unstructured":"Syukri, A.F.\n          , Okamoto, E. and Mambo, M. (1998), \u201cA user identification system using signature written with mouse\u201d, Proceedings of the Third Australasian Conference on Information Security and Privacy, Lecture Notes in Computer Science, Springer, London, Vol. 1438, pp. 403-14.","DOI":"10.1007\/BFb0053751"},{"issue":"4","key":"2025072819513682800_b34","doi-asserted-by":"crossref","first-page":"527","DOI":"10.1053\/apmr.2002.30627","article-title":"An ergonomic evaluation comparing desktop, notebook, and subnotebook computers","volume":"83","author":"Szeto","year":"2002","journal-title":"Archives of Physical Medicine and Rehabilitation"},{"key":"2025072819513682800_b35","doi-asserted-by":"crossref","unstructured":"Teh, P.S.\n          , Teoh, A.B.J., Ong, T.S. and Neo, H.F. (2008), \u201cStatistical fusion approach on keystroke dynamics\u201d, IEEE Conference on Signal-image Technologies and Internet-based System, pp. 918-23.","DOI":"10.1109\/SITIS.2007.46"}],"container-title":["Information Management &amp; Computer Security"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/www.emeraldinsight.com\/doi\/full-xml\/10.1108\/09685221011048328","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/www.emerald.com\/insight\/content\/doi\/10.1108\/09685221011048328\/full\/xml","content-type":"application\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/www.emerald.com\/ics\/article-pdf\/18\/2\/72\/1243942\/09685221011048328.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"syndication"},{"URL":"https:\/\/www.emerald.com\/ics\/article-pdf\/18\/2\/72\/1243942\/09685221011048328.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,7,28]],"date-time":"2025-07-28T23:51:49Z","timestamp":1753746709000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.emerald.com\/ics\/article\/18\/2\/72\/181885\/A-personalized-rhythm-click-based-authentication"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2010,6,8]]},"references-count":35,"journal-issue":{"issue":"2","published-print":{"date-parts":[[2010,6,8]]}},"URL":"https:\/\/doi.org\/10.1108\/09685221011048328","relation":{},"ISSN":["0968-5227","1758-5805"],"issn-type":[{"type":"print","value":"0968-5227"},{"type":"electronic","value":"1758-5805"}],"subject":[],"published":{"date-parts":[[2010,6,8]]}}}