1 |
R. Gaines, W. Lisowski, S. Press, and N. Shapiro, 'Authentication by Keystroke timing: some preliminary results,' Rand Report R-256-NSF, Rand Corporation, 1980
|
2 |
J. Leggett, G. Williams, 'Verifying identity via keystroke characteristics,' Int. J. Man-Mach. Stud. vol.28, no.1, pp. 67-76,1988
DOI
ScienceOn
|
3 |
J. Leggett, G. Williams, D. Umphress, 'Verification of user identity via keystroke characteristics,' Human Factors in management Information System, Ablex Publishing Corp., Norwood, NJ, 1988
|
4 |
T. Ord, S.M. Furnell, 'User
|