Pages • 5
User Authentication Through Typing PatternsEssay Preview: User Authentication Through Typing PatternsReport this essayUSER AUTHENTICATION THROUGH TYPING PATTERNSABSTRACTThe argument surrounding this research topic is that the use of keystroke rhythm is a natural choice for computer security. This argument stems from observations that similar neuro-physiological factors that make written signatures unique are also exhibited in a.