Review Article
A Survey of Keystroke Dynamics Biometrics
Table 1
Overview of different authentication approaches.
| Approach | Advantage | Disadvantage | Example |
| Knowledge | Effortless High acceptance | Forgotten Shoulder spoofing | Password PIN |
| Token | Cheap Simple deployment | Lost and theft | Smart card Minidevices |
| Biometrics | Deter sharing Unique Unforgettable | Cost Invasive | Fingerprint Voice Keystroke |
|
|