Number | Name | Date | Kind |
---|---|---|---|
5765152 | Erickson | Jun 1998 | A |
6081893 | Grawrock et al. | Jun 2000 | A |
6085321 | Gibbs et al. | Jul 2000 | A |
6085322 | Rommey et al. | Jul 2000 | A |
6094731 | Waldin et al. | Jul 2000 | A |
6141752 | Dancs et al. | Oct 2000 | A |
6158007 | Moreh et al. | Dec 2000 | A |
6170744 | Lee et al. | Jan 2001 | B1 |
6189097 | Tycksen, Jr. et al. | Feb 2001 | B1 |
6226743 | Naor et al. | May 2001 | B1 |
Entry |
---|
Gupta et al., Identity Authentication Based on Keystroke Latencies, Feb. 1990, Communications of ACM, vol. 33, pp.168-176.* |
Stiller man et al., Intrusion Detection for Distributed Applications, Jul. 1999, Communications of the ACM, vol. 42, No. 7, pp. 62-69. |