Login / Signup
Obfuscating Keystroke Time Intervals to Avoid Identification and Impersonation.
John V. Monaco
Charles C. Tappert
Published in:
CoRR (2016)
Keyphrases
</>
automatic identification
security analysis
smart card
multi agent
database
search engine
search algorithm
endpoints
text input