What complications arise in dynamic keystroke monitoring as a bio-metric authentication mechanism
when the users’ keystrokes are sent over the internet? In particular, what characteristics of the keystroke sequences are valid, and which ones are distorted by the network?
Go to Source
Author: Rubeni P Shaambeni