{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,21]],"date-time":"2026-02-21T19:13:49Z","timestamp":1771701229100,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":11,"publisher":"ACM","license":[{"start":{"date-parts":[[2009,6,18]],"date-time":"2009-06-18T00:00:00Z","timestamp":1245283200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"DOI":"10.13039\/501100003193","name":"Ministerstvo \u00fdkolstva, vedy, v\u00fdskumu a \u00fdportu Slovenskej republiky","doi-asserted-by":"publisher","award":["VEGA 1\/0508\/09"],"award-info":[{"award-number":["VEGA 1\/0508\/09"]}],"id":[{"id":"10.13039\/501100003193","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2009,6,18]]},"DOI":"10.1145\/1731740.1731836","type":"proceedings-article","created":{"date-parts":[[2010,3,2]],"date-time":"2010-03-02T19:20:59Z","timestamp":1267557659000},"page":"1-6","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":5,"title":["Multifactor authentication based on keystroke dynamics"],"prefix":"10.1145","author":[{"given":"Daniela","family":"Chud\u00e1","sequence":"first","affiliation":[]},{"given":"Michal","family":"\u010eurfina","sequence":"additional","affiliation":[]}],"member":"320","published-online":{"date-parts":[[2009,6,18]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2007.70207"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1145\/581271.581272"},{"key":"e_1_3_2_1_3_1","unstructured":"Biopassword: Authentication solutions through keystroke dynamics. {Online accessed February 25th 2009}. Available at: http:\/\/www.infosecurityproductsguide.com\/technology\/2007\/BioPassword_Authentication_Solutions_Whitepaper_FINAL.pdf  Biopassword: Authentication solutions through keystroke dynamics. {Online accessed February 25th 2009}. Available at: http:\/\/www.infosecurityproductsguide.com\/technology\/2007\/BioPassword_Authentication_Solutions_Whitepaper_FINAL.pdf"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1006\/imms.1993.1092"},{"key":"e_1_3_2_1_5_1","volume-title":"Shapiro, N.: Authentication by Keystroke Timing: some prelimary results, Rand Report R-256-NSF","author":"Gaines R.","year":"1980"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1145\/75577.75582"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1145\/266420.266434"},{"key":"e_1_3_2_1_8_1","unstructured":"Mroczkowski P.: Identity Verification using Keyboard Statistics. {Online accessed: January 26th 2009}. Available at: http:\/\/liu.diva-portal.org\/smash\/record.jsf?pid=diva2:19595  Mroczkowski P.: Identity Verification using Keyboard Statistics. {Online accessed: January 26th 2009}. Available at: http:\/\/liu.diva-portal.org\/smash\/record.jsf?pid=diva2:19595"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1016\/S0020-0255(97)00016-9"},{"key":"e_1_3_2_1_10_1","first-page":"40","article-title":"An On-line Neural Network System for Computer Access Security","author":"Obaidat M. S.","year":"1993","journal-title":"IEEE Trans. Industrial Electronics"},{"key":"e_1_3_2_1_11_1","first-page":"263","article-title":"Identity verification through keyboard characteristics. Int. J Man-Machine Studies","author":"Umphress D.","year":"1985","journal-title":"Septembre"}],"event":{"name":"CompSysTech '09: Proceedings of the 10th International Conference on Computer Systems and Technologies and Workshop for PhD Students in Computing","location":"Ruse Bulgaria","acronym":"CompSysTech '09"},"container-title":["Proceedings of the International Conference on Computer Systems and Technologies and Workshop for PhD Students in Computing"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1731740.1731836","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/1731740.1731836","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T13:38:49Z","timestamp":1750253929000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1731740.1731836"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2009,6,18]]},"references-count":11,"alternative-id":["10.1145\/1731740.1731836","10.1145\/1731740"],"URL":"https:\/\/doi.org\/10.1145\/1731740.1731836","relation":{},"subject":[],"published":{"date-parts":[[2009,6,18]]},"assertion":[{"value":"2009-06-18","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}