1. D.W. Davies, W.L. Price, “Security for Computer Network”, John Wiley & Son, Ltd, 1984.
2. M. Kasukawa, Y. Mori, K. Komatsu, H. Akaike, H. Kakuda, “An Evaluation and Improvement of User Authentication System Based on Keystroke Timing Data”, Transactions of Information Processing Society of Japan, Vol.33, No.5, pp.728–735, 1992. (in Japanese)
3. M. Kawasaki, H. Kakuda, Y. Mori, “An Identity Authentication Method Based on Arpeggio Keystrokes”, Transactions of Information Processing Society of Japan, Vol.34, No.5, pp.1198–1205, 1993. (in Japanese)
4. S. Bruce, “Applied Cryptography, Second Edition”, John Wiley & Son, Ltd, 1996.
5. M. Yoshimura, I. Yoshimura, “Recent Trends in Writer Recognition Technology”, The Journal of the Institute of Electronics, Information and Communication Engineers, PRMU96-48, pp.81–90, 1996. (in Japanese)