M. Zhu, J. Zhou, and J. K. Wang, “A new approach for user authentication based on biometrics,” Computer Engineering, Vol. 28, No. 10, October 2002.
S. Bleha, C. Slivinsky, and B.Hussien, “Computer-access security systems using keystroke dynamics[J],” IEEE Transactions on Pattern Analysis and Machine Intelli- gence, Vol. 12, No. 12, December 1990.
F. Monrose and A. D. Rubin, “Keystroke dynamics as a biometric for authentication. future generation computing systems (FGCS),” Journal: Security on The Web (Special issue), March 2000.
F. Monrose, M. K. Reiter, and S. Wetzel, “Password hardening based on keystroke dynamic,” Proceedings of the 6 ACM Conference on Computer and Communication Security, 1999.
R. Joyce and G. Gupta, “Identity authentication based on keystroke latencies,” Communications of the ACM, February 1990.
F. Bergadano, D. Gunetti, and C. Picardi, University of Torino, “User authentication through keystroke dynamics [J],” ACM Transactions on Information and System Security, Vol. 5, No. 4, November 2002.
W. G. de Ru and J. Eloff, “Enhanced password authen- tication through fuzzy logic[J],” IEEE Expert, Vol. 12, No. 6, November/December 1997.
Z. H. Deng, S. Q. Zhuo, etc., “The development of applications in mobile phone systems,” Science Press, March 2004.
R. Gaines, W. Lisowski, and S. Press, “Authentication by keystroke timing: Some preliminary results[R],” Rand Corporation:Rand Report R-2560-NSF, 1980.
J. Sleggett, G. Williams, and J. Usnick, “Dynamic iden-tity verification via keystroke characteristics,” Interna-tional Journal of Man-Machine Studies, 1991.