[1]
|
M. Zhu, J. Zhou, and J. K. Wang, “A new approach for user authentication based on biometrics,” Computer Engineering, Vol. 28, No. 10, October 2002.
|
[2]
|
S. Bleha, C. Slivinsky, and B.Hussien, “Computer-access security systems using keystroke dynamics[J],” IEEE Transactions on Pattern Analysis and Machine Intelli- gence, Vol. 12, No. 12, December 1990.
|
[3]
|
F. Monrose and A. D. Rubin, “Keystroke dynamics as a biometric for authentication. future generation computing systems (FGCS),” Journal: Security on The Web (Special issue), March 2000.
|
[4]
|
F. Monrose, M. K. Reiter, and S. Wetzel, “Password hardening based on keystroke dynamic,” Proceedings of the 6 ACM Conference on Computer and Communication Security, 1999.
|
[5]
|
R. Joyce and G. Gupta, “Identity authentication based on keystroke latencies,” Communications of the ACM, February 1990.
|
[6]
|
F. Bergadano, D. Gunetti, and C. Picardi, University of Torino, “User authentication through keystroke dynamics [J],” ACM Transactions on Information and System Security, Vol. 5, No. 4, November 2002.
|
[7]
|
W. G. de Ru and J. Eloff, “Enhanced password authen- tication through fuzzy logic[J],” IEEE Expert, Vol. 12, No. 6, November/December 1997.
|
[8]
|
Z. H. Deng, S. Q. Zhuo, etc., “The development of applications in mobile phone systems,” Science Press, March 2004.
|
[9]
|
R. Gaines, W. Lisowski, and S. Press, “Authentication by keystroke timing: Some preliminary results[R],” Rand Corporation:Rand Report R-2560-NSF, 1980.
|
[10]
|
J. Sleggett, G. Williams, and J. Usnick, “Dynamic iden-tity verification via keystroke characteristics,” Interna-tional Journal of Man-Machine Studies, 1991.
|