K. Boda, ´. A. Földes, G. Gulyás, and S. Imre, User tracking on the web via cross-browser fingerprinting Information Security Technology for Applications, pp.31-46, 2012.

S. Y. Cao and E. Wijmans, (Cross-)Browser Fingerprinting via OS and Hardware Level Features, Proceedings 2017 Network and Distributed System Security Symposium, p.17, 2017.
DOI : 10.14722/ndss.2017.23152

M. Dafer and M. El-abed, Evaluation of Keystroke Dynamics Authentication Systems, Developing Next-Generation Countermeasures for Homeland Security Threat Prevention, pp.306-329, 2017.
DOI : 10.4018/978-1-5225-0703-1.ch014

P. Eckersley, How unique is your web browser? Privacy Enhancing Technologies, pp.1-18, 2010.
DOI : 10.1007/978-3-642-14527-8_1

URL : http://www.freehaven.net/anonbib/cache/pets2010:eckersley2010unique.pdf

R. Gaines, W. Lisowski, S. Press, and N. Shapiro, Authentication by keystroke timing: some preliminary results, 1980.

J. D. Garcia, Personal identification apparatus, US Patent, vol.4621, p.334, 1986.

R. Giot, M. El-abed, B. Hemery, and C. Rosenberger, Unconstrained keystroke dynamics authentication with shared secret, Computers & Security, vol.30, issue.6-7, pp.427-445, 2011.
DOI : 10.1016/j.cose.2011.03.004

URL : https://hal.archives-ouvertes.fr/hal-00628554

R. Giot, M. El-abed, and C. Rosenberger, GREYC keystroke: A benchmark for keystroke dynamics biometric systems, 2009 IEEE 3rd International Conference on Biometrics: Theory, Applications, and Systems, pp.1-6, 2009.
DOI : 10.1109/BTAS.2009.5339051

URL : https://hal.archives-ouvertes.fr/hal-00432768

P. Lacharme and A. Plateaux, Pin-based cancelable biometrics, International Journal of Automated Identification Technology (IJAIT), vol.3, issue.2, pp.75-79, 2011.
URL : https://hal.archives-ouvertes.fr/hal-00984027

P. Laperdrix, W. Rudametkin, and B. Baudry, Beauty and the Beast: Diverting Modern Web Browsers to Build Unique Browser Fingerprints, 2016 IEEE Symposium on Security and Privacy (SP), pp.878-894, 2016.
DOI : 10.1109/SP.2016.57

URL : https://hal.archives-ouvertes.fr/hal-01285470

N. Nikiforakis, W. Joosen, and B. Livshits, PriVaricator, Proceedings of the 24th International Conference on World Wide Web, WWW '15, pp.820-830, 2015.
DOI : 10.1109/SP.2011.23

V. V. Phoaha, S. Phoha, A. Ray, S. S. Joshi, and S. K. Vuyyuru, Hidden markov model (hmm)-based user authentication using keystroke dynamics, 2009.

A. Teoh, D. Ngo, and A. Goh, Biohashing: two factor authentication featuring fingerprint data and tokenised random number. Pattern recognition, p.40, 2004.