Skip to main content

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 799.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Hardcover Book
USD 949.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Recommended Reading

  1. Spillane R (1975) Keyboard apparatus for personal identification. IBM Technical Disclosure Bull 17(3346)

    Google Scholar 

  2. Joyce R, Gupta G (1990) Identity authorization based on keystroke latencies. Commun ACM 33(2):168–176

    Article  Google Scholar 

  3. Peacock A, Ke X, Wilkerson M (2004) Typing patterns: a key to user identification. IEEE Security & Privacy 2(5): 40–47

    Article  Google Scholar 

  4. Bleha S, Slivinsky C, Hussien B (1990) Computer-access security systems using keystroke dynamics. IEEE Trans Pattern Anal Mach Intell 12:1217–1222

    Article  Google Scholar 

  5. Obaidat M, Sadoun B (1997) Verification of computer users using keystroke dynamics. IEEE Trans Syst Man Cy B 27(2): 261–269

    Article  Google Scholar 

  6. Monrose F, Rubin AD (2000) Keystroke dynamics as a biometric for authentication. Future Gen Comp Sys 16:351–359

    Article  Google Scholar 

  7. Bergadano F, Gunetti D, Picardi C (2002) User authentication through keystroke dynamics. ACM Trans Inform Syst Sec 5(4):367–397

    Article  Google Scholar 

  8. Araújo LCF, Sucupira LHR Jr, Lizarraga MG, Ling LL, Yabu-Uti JBT (2005) User authentication through typing biometrics features. IEEE Trans Signal Process 53(2):851–855

    Article  MathSciNet  Google Scholar 

  9. Sheng Y, Phoha VV, Rovnyak SM (2005) A parallel decision tree-based method for user authentication based on keystroke patterns. IEEE Trans Syst Man Cy B 35(4):826–833

    Article  Google Scholar 

  10. Hosseinzadeh D, Krishnan S (2008) Gaussian mixture modeling of keystroke patterns for biometric applications. IEEE Trans Syst Man Cy C 38(6):816–826

    Article  Google Scholar 

  11. Gunetti D, Picardi C (2005) Keystroke analysis of free text. ACM Trans Inform Syst Sec 8(3):312–347

    Article  Google Scholar 

  12. Clarke NL, Furnell SM, Lines BM, Reynolds PL (2003) Keystroke dynamics on a mobile handset: a feasibility study. Inform Manage Comp Sec 11(4):161–166

    Article  Google Scholar 

  13. Clarke NL, Furnell SM (2007) Authentication mobile phone users using keystroke analysis. Int J Inform Sec 6(6):1–14

    Google Scholar 

  14. Campisi P, Maiorana E, Lo Bosco M, Neri A (2009) User authentication using keystroke dynamics for cellular phones. IET Signal Process 3(4):333–341

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2011 Springer Science+Business Media, LLC

About this entry

Cite this entry

Campisi, P., Neri, A. (2011). Keystroke Dynamics. In: van Tilborg, H.C.A., Jajodia, S. (eds) Encyclopedia of Cryptography and Security. Springer, Boston, MA. https://doi.org/10.1007/978-1-4419-5906-5_877

Download citation

Publish with us

Policies and ethics