{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,4,30]],"date-time":"2025-04-30T21:20:02Z","timestamp":1746048002488,"version":"3.28.0"},"reference-count":17,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2010,10]]},"DOI":"10.1109\/icsmc.2010.5641687","type":"proceedings-article","created":{"date-parts":[[2010,11,30]],"date-time":"2010-11-30T16:35:53Z","timestamp":1291134953000},"page":"3926-3929","source":"Crossref","is-referenced-by-count":1,"title":["Design and implementation of a RFID-based authentication system by using keystroke dynamics"],"prefix":"10.1109","author":[{"family":"Chun-wei Tseng","sequence":"first","affiliation":[]},{"family":"Feng-jung Liu","sequence":"additional","affiliation":[]},{"family":"Ting-yi Lin","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","doi-asserted-by":"crossref","first-page":"351","DOI":"10.1016\/S0167-739X(99)00059-X","article-title":"Keystroke dynamics as a biometric for authentication","volume":"16","author":"fabian","year":"2000","journal-title":"Future Generation Computer Systems"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/3477.558812"},{"key":"ref12","article-title":"Authentication by Keystroke Timing: Some Preliminary Results","author":"stockton gaines","year":"1980","journal-title":"Press & Norman Shapiro"},{"key":"ref13","doi-asserted-by":"crossref","first-page":"351","DOI":"10.1016\/S0167-739X(99)00059-X","article-title":"Keystroke Dynamics as a Biometric for Authentication","volume":"16","author":"fabian","year":"2000","journal-title":"Future Generation Computer Systems"},{"key":"ref14","first-page":"48","article-title":"Authentication via keystroke dynamics","author":"monrose","year":"1997","journal-title":"Fourth ACM Conference on Computer and Communications Security"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2004.02.004"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/3477.558812"},{"journal-title":"Smart Card - Wikipedia the Free Encyclopedia","article-title":"Wikipedia contributors","year":"2008","key":"ref17"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1016\/S0020-7373(05)80165-8"},{"journal-title":"Authentication by keystroke timing some preliminary results Rand Report R-256-NSF Rand Corporation","year":"1980","author":"gaines","key":"ref3"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/3477.558812"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1006\/imms.1993.1092"},{"key":"ref8","article-title":"Apparatus for Authenticating an Individual Based on a Typing Pattern by Using a Neural Network System","volume":"20231","author":"cho","year":"2000"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1207\/S15327744JOCE1004_07"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2006.873653"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/3468.661150"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/6.259484"}],"event":{"name":"2010 IEEE International Conference on Systems, Man and Cybernetics - SMC","start":{"date-parts":[[2010,10,10]]},"location":"Istanbul, Turkey","end":{"date-parts":[[2010,10,13]]}},"container-title":["2010 IEEE International Conference on Systems, Man and Cybernetics"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/5629466\/5641665\/05641687.pdf?arnumber=5641687","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,6,6]],"date-time":"2019-06-06T13:59:47Z","timestamp":1559829587000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/5641687\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2010,10]]},"references-count":17,"URL":"https:\/\/doi.org\/10.1109\/icsmc.2010.5641687","relation":{},"subject":[],"published":{"date-parts":[[2010,10]]}}}