Proceedings of the 4th ACM Conference on Computer and Communications Security 1997
DOI: 10.1145/266420.266434
|View full text |Cite
|
Sign up to set email alerts
|

Authentication via keystroke dynamics

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
189
0
1

Year Published

2000
2000
2021
2021

Publication Types

Select...
3
2
1

Relationship

1
5

Authors

Journals

citations
Cited by 336 publications
(194 citation statements)
references
References 17 publications
0
189
0
1
Order By: Relevance
“…It has already been shown (see [14,18,20]) that keystroke rhythm is a good sign of identity. Moreover, unlike other biometric systems which may be expensive to implement, keystroke dynamics is almost free -the only hardware required is the keyboard.…”
Section: Keystroke Dynamics: Not What You Type But How You Typementioning
confidence: 98%
See 4 more Smart Citations
“…It has already been shown (see [14,18,20]) that keystroke rhythm is a good sign of identity. Moreover, unlike other biometric systems which may be expensive to implement, keystroke dynamics is almost free -the only hardware required is the keyboard.…”
Section: Keystroke Dynamics: Not What You Type But How You Typementioning
confidence: 98%
“…The rationale for this approach is that digraphs with abnormally long latencies are not likely to be representative of the authorized user's typing. While this seems like a reasonable assumption it has recently been shown ( [18,20]) that one filter value for all typists does not yield optimal performance.…”
Section: The Current State Of Keystroke Dynamicsmentioning
confidence: 99%
See 3 more Smart Citations