Secur, volume 6, pages 1–14, Berlin and Heidelberg.
Springer-Verlag.
Cranor, L. F. and Garfinkel, S. (2005). Security and Usabil-
ity: Designing Secure Systems That People Can Use.
O’Reilly Media, illustrated edition.
Fitts, P. M. (1992). The information capacity of the human
motor system in controlling the amplitude of move-
ment. 1954. J EXP PSYCHOL GEN, 121(3):262–269.
Funk, R. E., Taylor, M. L., Creekmur, C. C., Ohlinger,
C. M., Cox, R. H., and Berg, W. P. (2012). Effect
of walking speed on typing performance using an ac-
tive workstation 1,2. Perceptual and Motor Skills,
115(1):309–318.
Hall, M., Frank, E., Holmes, G., Pfahringer, B., Reutemann,
P., and Witten, I. H. (2009). The weka data mining
software: An update. In SIGKDD Explorations, vol-
ume 11.
Luca, A. d., Hang, A., Brudy, F., Lindner, C., and Huss-
mann, H. (2012). Touch me once and i know it’s you!:
implicit authentication based on touch screen patterns.
In CHI’12, pages 987–996.
Maiorana, E., Campisi, P., Gonz
´
alez-Carballo, N., and Neri,
A. (2011). Keystroke dynamics authentication for mo-
bile phones. In Proceedings of the 2011 ACM Sympo-
sium on Applied Computing, SAC ’11, pages 21–26,
New York and NY and USA. ACM.
Monrose, F. and Rubin, A. D. (2000). Keystroke dynamics
as a biometric for authentication. In Future Genera-
tion Computer Systems, volume 16, pages 351–359.
Elsevier Science Publishers B. V.
Owens, D. A. (1984). The resting state of the eyes: Our
ability to see under adverse conditions depends on the
involuntary focus and convergence of our eyes at rest.
In Sigma Xi, T. S. R. S., editor, American Scientist,
pages 378–387.
Pan, C. S., Shell, R. L., and Schleifer, L. M. (1994). Perfor-
mance variability as an indicator of fatigue and bore-
dom effects in a vdt data–entry task. International
Journal of Human-Computer Interaction, 6(1):37–45.
Ross, A. A., Nandakumar, K., and Jain, A. K. (2006). Hand-
book of Multibiometrics (International Series on Bio-
metrics). Springer-Verlag New York, Inc, Secaucus
and NJ and USA.
Shanmugapriya, D. and Padmavathi, G. (2009). A sur-
vey of biometric keystroke dynamics: Approaches,
security and challenges. In International Journal of
Computer Science and Information Security, volume
abs/0910.0817 of Vol. 5, No. 1.
Trojahn, M. and Ortmeier, F. (2012). Biometric authenti-
cation through a virtual keyboard for smartphones. In
International Journal of Computer Science & Infor-
mation Technology (IJCSIT).
Vielhauer, C. (2006). Biometric User Authentication for IT
Security: From Fundamentals to Handwriting. Ad-
vances in information security. Springer-Verlag.
Vizer, L. M., Zhou, L., and Sears, A. (2009). Automated
stress detection using keystroke and linguistic fea-
tures: An exploratory study. International Journal of
Human-Computer Studies, 67(10):870–886.
ICPRAM2013-InternationalConferenceonPatternRecognitionApplicationsandMethods
640