7Dunn A. Biometric Authentication--Real Identities tor a Virtual World. MIDAS. Project Development Final Report, 2002.
8Monrose F, Rubin A. Authentication via Keystroke Dynamics. Fourth ACM Conference on Computer and Communications Security, 19973.
9Kacholia V, Pandit S. Biometric Authentication Using Random Distributions [A]. Proceedings of the 15th Canadian IT Security Symposium [C]. Ottawa, Canada, 2003-05:1-8.
10de Ru w G, Eloff J.Enhanced Password Authentication Through Fuzzy Logic. IEEE Expert, 1997, 12(6): 38-45.