Verifying identity via keystroke characteristics
International Journal of Man-Machine Studies
Verification of user identity via keyboard characteristics
Human factors in management information systems
The keystroke-level model for user performance time with interactive systems
Communications of the ACM
ACM SIGSAC Review
Authentication via keystroke dynamics
Proceedings of the 4th ACM conference on Computer and communications security
A verification methodology for computer systems users
SAC '95 Proceedings of the 1995 ACM symposium on Applied computing
Password hardening based on keystroke dynamics
CCS '99 Proceedings of the 6th ACM conference on Computer and communications security
User authentication through keystroke dynamics
ACM Transactions on Information and System Security (TISSEC)
iButton Enrolment and Verification Requirements for the Pressure Sequence Smartcard Biometric
E-SMART '01 Proceedings of the International Conference on Research in Smart Cards: Smart Card Programming and Security
CHI '03 Extended Abstracts on Human Factors in Computing Systems
Identity Authentication Based on Keystroke Latencies Using Neural Networks
Journal of Computing Sciences in Colleges
Typing Patterns: A Key to User Identification
IEEE Security and Privacy
An investigation into keystroke latency metrics as an indicator of programming performance
ACE '05 Proceedings of the 7th Australasian conference on Computing education - Volume 42
Keystroke analysis of free text
ACM Transactions on Information and System Security (TISSEC)
Haptic: the new biometrics-embedded media to recognizing and quantifying human patterns
Proceedings of the 13th annual ACM international conference on Multimedia
A password authentication scheme over insecure networks
Journal of Computer and System Sciences
Timing analysis of keystrokes and timing attacks on SSH
SSYM'01 Proceedings of the 10th conference on USENIX Security Symposium - Volume 10
Timing analysis of keystrokes and timing attacks on SSH
SSYM'01 Proceedings of the 10th conference on USENIX Security Symposium - Volume 10
An evolutionary keystroke authentication based on ellipsoidal hypothesis space
Proceedings of the 9th annual conference on Genetic and evolutionary computation
Identity verification through dynamic keystroke analysis
Intelligent Data Analysis
Enhanced password authentication through keystroke typing characteristics
AIAP'07 Proceedings of the 25th conference on Proceedings of the 25th IASTED International Multi-Conference: artificial intelligence and applications
A New Biometric Technology Based on Mouse Dynamics
IEEE Transactions on Dependable and Secure Computing
User identification based on game-play activity patterns
Proceedings of the 6th ACM SIGCOMM workshop on Network and system support for games
A machine learning approach to keystroke dynamics based user authentication
International Journal of Electronic Security and Digital Forensics
Hierarchical Hidden Markov Models for User/Process Profile Learning
Fundamenta Informaticae - Special issue ISMIS'05
Keystroke Dynamics for Biometrics Identification
ICANNGA '07 Proceedings of the 8th international conference on Adaptive and Natural Computing Algorithms, Part II
Recognizing Individual Typing Patterns
IbPRIA '07 Proceedings of the 3rd Iberian conference on Pattern Recognition and Image Analysis, Part II
User Identification Based on Handwritten Signatures with Haptic Information
EuroHaptics '08 Proceedings of the 6th international conference on Haptics: Perception, Devices and Scenarios
The Effect of Clock Resolution on Keystroke Dynamics
RAID '08 Proceedings of the 11th international symposium on Recent Advances in Intrusion Detection
Expressive typing: a new way to sense typing pressure and its applications
CHI '09 Extended Abstracts on Human Factors in Computing Systems
Automated stress detection using keystroke and linguistic features: An exploratory study
International Journal of Human-Computer Studies
Multimedia Forensics Is Not Computer Forensics
IWCF '09 Proceedings of the 3rd International Workshop on Computational Forensics
Battle of Botcraft: fighting bots in online games with human observational proofs
Proceedings of the 16th ACM conference on Computer and communications security
Keystroke-Based User Identification on Smart Phones
RAID '09 Proceedings of the 12th International Symposium on Recent Advances in Intrusion Detection
Multifactor authentication based on keystroke dynamics
CompSysTech '09 Proceedings of the International Conference on Computer Systems and Technologies and Workshop for PhD Students in Computing
Biometric identification via an oculomotor plant mathematical model
Proceedings of the 2010 Symposium on Eye-Tracking Research & Applications
On the use of rough sets for user authentication via keystroke dynamics
EPIA'07 Proceedings of the aritficial intelligence 13th Portuguese conference on Progress in artificial intelligence
Feature analysis of mouse dynamics in identity authentication and monitoring
ICC'09 Proceedings of the 2009 IEEE international conference on Communications
Peeping tom in the neighborhood: keystroke eavesdropping on multi-user systems
SSYM'09 Proceedings of the 18th conference on USENIX security symposium
PRICAI'10 Proceedings of the 11th Pacific Rim international conference on Trends in artificial intelligence
Typing Biometrics: Impact of Human Learning on Performance Quality
Journal of Data and Information Quality (JDIQ)
Why did my detector do that?!: predicting keystroke-dynamics error rates
RAID'10 Proceedings of the 13th international conference on Recent advances in intrusion detection
Review Article: Biometric personal authentication using keystroke dynamics: A review
Applied Soft Computing
Biometric keypads: Improving accuracy through optimal PIN selection
Decision Support Systems
On the discriminability of keystroke feature vectors used in fixed text keystroke authentication
Pattern Recognition Letters
Optimising password security through key-pattern analysis
International Journal of Internet Technology and Secured Transactions
Using global knowledge of users' typing traits to attack keystroke biometrics templates
Proceedings of the thirteenth ACM multimedia workshop on Multimedia and security
Experimental evaluation of hierarchical hidden markov models
AI*IA'05 Proceedings of the 9th conference on Advances in Artificial Intelligence
Dealing with different languages and old profiles in keystroke analysis of free text
AI*IA'05 Proceedings of the 9th conference on Advances in Artificial Intelligence
Classification of fingerprint images to real vs. spoof
International Journal of Biometrics
Biometric access control through numerical keyboards based on keystroke dynamics
ICB'06 Proceedings of the 2006 international conference on Advances in Biometrics
Enhancing login security through the use of keystroke input dynamics
ICB'06 Proceedings of the 2006 international conference on Advances in Biometrics
Learning profiles based on hierarchical hidden markov model
ISMIS'05 Proceedings of the 15th international conference on Foundations of Intelligent Systems
Keystroke analysis of different languages: a case study
IDA'05 Proceedings of the 6th international conference on Advances in Intelligent Data Analysis
Mobile device integration of a fingerprint biometric remote authentication scheme
International Journal of Communication Systems
Hierarchical Hidden Markov Models for User/Process Profile Learning
Fundamenta Informaticae - Special issue ISMIS'05
A personal touch: recognizing users based on touch screen behavior
Proceedings of the Third International Workshop on Sensing Applications on Mobile Phones
Keystroke dynamics in a general setting
ICB'07 Proceedings of the 2007 international conference on Advances in Biometrics
A text input method for half-sized keyboard using keying interval
Proceedings of the 11th International Conference on Mobile and Ubiquitous Multimedia
An anomaly based approach for HID attack detection using keystroke dynamics
CSS'12 Proceedings of the 4th international conference on Cyberspace Safety and Security
Keystroke timing analysis of on-the-fly web apps
ACNS'13 Proceedings of the 11th international conference on Applied Cryptography and Network Security
Expert Systems with Applications: An International Journal
Is it really you?: user identification via adaptive behavior fingerprinting
Proceedings of the 4th ACM conference on Data and application security and privacy
Hi-index | 48.22 |
The variables that help make a handwritten signature a unique human identifier also provide a unique digital signature in the form of a stream of latency periods between keystrokes. This article describes a method of verifying the identity of a user based on such a digital signature, and reports results from trial usage of the system.