{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,20]],"date-time":"2025-10-20T10:22:24Z","timestamp":1760955744699},"reference-count":22,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2017,12]]},"DOI":"10.1109\/wifs.2017.8267670","type":"proceedings-article","created":{"date-parts":[[2018,1,30]],"date-time":"2018-01-30T21:06:44Z","timestamp":1517346404000},"page":"1-6","source":"Crossref","is-referenced-by-count":18,"title":["Benchmarking keystroke authentication algorithms"],"prefix":"10.1109","author":[{"given":"Jiaju","family":"Huang","sequence":"first","affiliation":[]},{"given":"Daqing","family":"Hou","sequence":"additional","affiliation":[]},{"given":"Stephanie","family":"Schuckers","sequence":"additional","affiliation":[]},{"given":"Timothy","family":"Law","sequence":"additional","affiliation":[]},{"given":"Adam","family":"Sherwin","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/WIFS.2016.7823894"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/BTAS.2017.8272738"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/CSICC.2009.5349640"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1093\/comjnl\/bxr064"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/CIS.2010.95"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/BTAS.2016.7791182"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1504\/IJBM.2008.018665"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.13176\/11.427"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1145\/2591684"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1016\/j.istr.2012.02.001"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1145\/1085126.1085129"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1007\/1-4020-8143-X_18"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/TCYB.2013.2257745"},{"key":"ref5","first-page":"1","article-title":"Contin-uous and non-intrusive identity verification in real-time environments based on free-text keystroke dynamics","author":"messerman","year":"2011","journal-title":"Biometrics (IJCB) 2011 International Joint Conference"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/IJCB.2011.6117480"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-74549-5_62"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1016\/S0167-739X(99)00059-X"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1145\/266420.266434"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/BTAS.2014.6996259"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/ISBA.2015.7126361"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1109\/WIFS.2016.7823899"},{"key":"ref21","first-page":"1065","author":"parzen","year":"1962","journal-title":"On Estimation of a Probability Density Function and Mode"}],"event":{"name":"2017 IEEE Workshop on Information Forensics and Security (WIFS)","start":{"date-parts":[[2017,12,4]]},"location":"Rennes","end":{"date-parts":[[2017,12,7]]}},"container-title":["2017 IEEE Workshop on Information Forensics and Security (WIFS)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/8258575\/8267640\/08267670.pdf?arnumber=8267670","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,2,2]],"date-time":"2020-02-02T14:31:06Z","timestamp":1580653866000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/8267670\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017,12]]},"references-count":22,"URL":"https:\/\/doi.org\/10.1109\/wifs.2017.8267670","relation":{},"subject":[],"published":{"date-parts":[[2017,12]]}}}