Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Recommended Reading
Spillane R (1975) Keyboard apparatus for personal identification. IBM Technical Disclosure Bull 17(3346)
Joyce R, Gupta G (1990) Identity authorization based on keystroke latencies. Commun ACM 33(2):168–176
Peacock A, Ke X, Wilkerson M (2004) Typing patterns: a key to user identification. IEEE Security & Privacy 2(5): 40–47
Bleha S, Slivinsky C, Hussien B (1990) Computer-access security systems using keystroke dynamics. IEEE Trans Pattern Anal Mach Intell 12:1217–1222
Obaidat M, Sadoun B (1997) Verification of computer users using keystroke dynamics. IEEE Trans Syst Man Cy B 27(2): 261–269
Monrose F, Rubin AD (2000) Keystroke dynamics as a biometric for authentication. Future Gen Comp Sys 16:351–359
Bergadano F, Gunetti D, Picardi C (2002) User authentication through keystroke dynamics. ACM Trans Inform Syst Sec 5(4):367–397
Araújo LCF, Sucupira LHR Jr, Lizarraga MG, Ling LL, Yabu-Uti JBT (2005) User authentication through typing biometrics features. IEEE Trans Signal Process 53(2):851–855
Sheng Y, Phoha VV, Rovnyak SM (2005) A parallel decision tree-based method for user authentication based on keystroke patterns. IEEE Trans Syst Man Cy B 35(4):826–833
Hosseinzadeh D, Krishnan S (2008) Gaussian mixture modeling of keystroke patterns for biometric applications. IEEE Trans Syst Man Cy C 38(6):816–826
Gunetti D, Picardi C (2005) Keystroke analysis of free text. ACM Trans Inform Syst Sec 8(3):312–347
Clarke NL, Furnell SM, Lines BM, Reynolds PL (2003) Keystroke dynamics on a mobile handset: a feasibility study. Inform Manage Comp Sec 11(4):161–166
Clarke NL, Furnell SM (2007) Authentication mobile phone users using keystroke analysis. Int J Inform Sec 6(6):1–14
Campisi P, Maiorana E, Lo Bosco M, Neri A (2009) User authentication using keystroke dynamics for cellular phones. IET Signal Process 3(4):333–341
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2011 Springer Science+Business Media, LLC
About this entry
Cite this entry
Campisi, P., Neri, A. (2011). Keystroke Dynamics. In: van Tilborg, H.C.A., Jajodia, S. (eds) Encyclopedia of Cryptography and Security. Springer, Boston, MA. https://doi.org/10.1007/978-1-4419-5906-5_877
Download citation
DOI: https://doi.org/10.1007/978-1-4419-5906-5_877
Publisher Name: Springer, Boston, MA
Print ISBN: 978-1-4419-5905-8
Online ISBN: 978-1-4419-5906-5
eBook Packages: Computer ScienceReference Module Computer Science and Engineering