{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,2]],"date-time":"2025-10-02T06:00:25Z","timestamp":1759384825755},"reference-count":0,"publisher":"IGI Global","issue":"2","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2007,4,1]]},"abstract":"<p>The design of an authentication system based on keystroke dynamics is made difficult by the fact that the typing behaviour of a person is subject to strong fluctuations. An asymmetrical method able to handle this difficulty by using a long text on enrolment and a short one at login is analysed in this article. The results of an empirical study based on an extensive field test are presented. The study demonstrates that the advantages of the analysed method remain even if a predefined input text is used. The results also show that the method\u2019s quality highly depends on the amount of text typed on enrolment as well as on login, which makes the system scalable to different security levels. They also confirm the importance of using stable characteristics that are due, for example, to the user\u2019s right- or left-handedness. The method\u2019s learning velocity is shown to be high, which enables enrolment to be kept short. Moreover, the study demonstrates that admitting multiple login attempts significantly ameliorates the recognition performance without sacrificing security.<\/p>","DOI":"10.4018\/jisp.2007040101","type":"journal-article","created":{"date-parts":[[2011,2,15]],"date-time":"2011-02-15T18:54:18Z","timestamp":1297796058000},"page":"1-12","source":"Crossref","is-referenced-by-count":11,"title":["On the Design of an Authentication System Based on Keystroke Dynamics Using a Predefined Input Text"],"prefix":"10.4018","volume":"1","author":[{"given":"Dieter","family":"Bartmann","sequence":"first","affiliation":[{"name":"Universit\u00e4t Regensburg, Germany"}]},{"given":"Idir","family":"Bakdi","sequence":"additional","affiliation":[{"name":"Universit\u00e4t Regensburg, Germany"}]},{"given":"Michael","family":"Achatz","sequence":"additional","affiliation":[{"name":"Universit\u00e4t Regensburg, Germany"}]}],"member":"2432","container-title":["International Journal of Information Security and Privacy"],"original-title":[],"language":"ng","link":[{"URL":"https:\/\/www.igi-global.com\/viewtitle.aspx?TitleId=2458","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,6,2]],"date-time":"2022-06-02T03:56:22Z","timestamp":1654142182000},"score":1,"resource":{"primary":{"URL":"https:\/\/services.igi-global.com\/resolvedoi\/resolve.aspx?doi=10.4018\/jisp.2007040101"}},"subtitle":[""],"short-title":[],"issued":{"date-parts":[[2007,4,1]]},"references-count":0,"journal-issue":{"issue":"2","published-print":{"date-parts":[[2007,4]]}},"URL":"https:\/\/doi.org\/10.4018\/jisp.2007040101","relation":{},"ISSN":["1930-1650","1930-1669"],"issn-type":[{"value":"1930-1650","type":"print"},{"value":"1930-1669","type":"electronic"}],"subject":[],"published":{"date-parts":[[2007,4,1]]}}}