Gaines, R. Stockton et al., "Authentication by Keystroke Timing: Some Preliminary Results", Rand Co., R-2526-NSF, 5/80. |
Umphress, David et al., "Identity Verification Through Keyboard Characteristics", Int. J. Man-Mach. St., pp. 263-273, 1985. |
Riganati, John P., "An Overview of Electronic ID Systems", WESCON Tech. Papers, 1975. |
Rennick, R. J. et al., "Mufti-A Multi-Function ID System", WESCON Tech. Papers, 1975. |
Cotton, Ira W. et al., "Approaches to Controlling Personal Access to Computer Terminals", Proceeding Computer Networks: Treads & Appos., 1975. |
"Guidelines on Evaluation of Techniques for Automated Personal ID", U.S. Dept. of Comm./NBS, FIPS, PUB 48, 4.1.77. |
"Keystroke Dynamics Authentication of Computer Terminal Users", Bioaccess System 2000, 2000A, 2001, 2011, and OEM, 6.29.84. |
Kullback, Solomon, Information Theory & Statistics, John Wiley & Sons Inc., pp. 3383, 1959. |