Keystroke dynamics

Keystroke dynamics, keystroke biometrics or typing dynamics, is the detailed timing information that describes exactly when each key was pressed and… (More)
Wikipedia

Papers overview

Semantic Scholar uses AI to extract papers important to this topic.
Highly Cited
2012
Highly Cited
2012
In this paper we will describe a way to evaluate a biometric continuous keystroke dynamics system. Such a system will… (More)
Is this relevant?
Highly Cited
2011
Highly Cited
2011
The ability to recognize emotions is an important part of building intelligent computers. Emotionally-aware systems would have a… (More)
  • table 1
  • figure 1
  • figure 2
  • table 2
  • table 4
Is this relevant?
Highly Cited
2009
Highly Cited
2009
Keystroke dynamics-the analysis of typing rhythms to discriminate among users-has been proposed for detecting impostors (i.e… (More)
  • table 1
  • figure 1
  • table 2
Is this relevant?
Highly Cited
2002
Highly Cited
2002
Unlike other access control systems based on biometric features, keystroke analysis has not led to techniques providing an… (More)
  • figure 1
  • figure 2
  • figure 3
  • table I
  • table II
Is this relevant?
Highly Cited
2002
Highly Cited
2002
We present a novel approach to improving the security of passwords. In our approach, the legitimate user’s typing patterns (e.g… (More)
  • figure 1
  • figure 3
  • figure 2
  • figure 5
  • figure 4
Is this relevant?
Highly Cited
2000
Highly Cited
2000
More than ever before the Internet is changing computing as we know it. Global access to information and resources is becoming an… (More)
  • figure 1
  • figure 2
  • figure 3
Is this relevant?
Highly Cited
2000
Highly Cited
2000
Password typing is the most widely used identity verification method in World Wide Web based Electronic Commerce. Due to its… (More)
  • table III
  • table II
  • table IV
  • figure 1
  • figure 2
Is this relevant?
Highly Cited
1998
Highly Cited
1998
The keystroke dynamics of a computer user’s login string provide a characteristic pattern that can be used for identity… (More)
  • figure 1
  • table I
  • table II
  • table III
  • table IV
Is this relevant?
Highly Cited
1997
Highly Cited
1997
In an effort to confront the challenges brought forward by the networking revolution of the past few years, we present improved… (More)
  • figure 1
  • figure 3
  • figure 2
  • figure 4
  • figure 5
Is this relevant?
Highly Cited
1997
Highly Cited
1997
This paper presents techniques to verify the identity of computer users using the keystroke dynamics of computer user's login… (More)
Is this relevant?