Return to Article Details Comparative analysis of advanced technologies for authenticating users by keystroke dynamics Download Download PDF