iBet uBet web content aggregator. Adding the entire web to your favor.
iBet uBet web content aggregator. Adding the entire web to your favor.



Link to original content: https://api.crossref.org/works/10.1145/2207676.2208544
{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,30]],"date-time":"2024-10-30T19:20:41Z","timestamp":1730316041864,"version":"3.28.0"},"publisher-location":"New York, NY, USA","reference-count":38,"publisher":"ACM","content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2012,5,5]]},"DOI":"10.1145\/2207676.2208544","type":"proceedings-article","created":{"date-parts":[[2012,5,7]],"date-time":"2012-05-07T18:47:53Z","timestamp":1336416473000},"page":"987-996","update-policy":"http:\/\/dx.doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":292,"title":["Touch me once and i know it's you!"],"prefix":"10.1145","author":[{"given":"Alexander","family":"De Luca","sequence":"first","affiliation":[{"name":"University of Munich, Munich, Bavaria, Germany"}]},{"given":"Alina","family":"Hang","sequence":"additional","affiliation":[{"name":"University of Munich, Munich, Bavaria, Germany"}]},{"given":"Frederik","family":"Brudy","sequence":"additional","affiliation":[{"name":"University of Munich, Munich, Bavaria, Germany"}]},{"given":"Christian","family":"Lindner","sequence":"additional","affiliation":[{"name":"University of Munich, Munich, Bavaria, Germany"}]},{"given":"Heinrich","family":"Hussmann","sequence":"additional","affiliation":[{"name":"University of Munich, Munich, Bavaria, Germany"}]}],"member":"320","published-online":{"date-parts":[[2012,5,5]]},"reference":[{"volume-title":"USENIX 4th Workshop WOOT","year":"2010","author":"Aviv A. J.","key":"e_1_3_2_1_1_1","unstructured":"Aviv , A. J. , Gibson , K. , Mossop , E. , Blaze , M. , Smith , J. M. Smudge attacks on smartphone touch screens . In USENIX 4th Workshop WOOT 2010 . Aviv, A. J., Gibson, K., Mossop, E., Blaze, M., Smith, J. M. Smudge attacks on smartphone touch screens. In USENIX 4th Workshop WOOT 2010."},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1007\/11493648_1"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1109\/34.464560"},{"volume-title":"Proceedings AIMS","year":"2008","author":"Buchoux A.","key":"e_1_3_2_1_4_1","unstructured":"Buchoux , A. , Clarke , N.L. Deployment of keystroke analysis on a smartphone . In Proceedings AIMS 2008 . Buchoux, A., Clarke, N.L. Deployment of keystroke analysis on a smartphone. In Proceedings AIMS 2008."},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1016\/0010-0285(80)90003-1"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1145\/1866835.1866837"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10207-006-0006-6"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1016\/S0167-4048(02)00304-8"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1145\/642611.642639"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.3758\/BF03337021"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1145\/1572532.1572542"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1145\/1315245.1315252"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1037\/h0041220"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1145\/1890791.1890796"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.18637\/jss.v031.i07"},{"volume-title":"Biometric gait authentication using accelerometer sensor. Journal of Computers, 1 (7)","year":"2006","author":"Gafurov D.","key":"e_1_3_2_1_16_1","unstructured":"Gafurov , D. , Helkala , K. , S\u00f8ndrol , T. Biometric gait authentication using accelerometer sensor. Journal of Computers, 1 (7) . Academy Publisher ( 2006 ), 51--59. Gafurov, D., Helkala, K., S\u00f8ndrol, T. Biometric gait authentication using accelerometer sensor. Journal of Computers, 1 (7). Academy Publisher (2006), 51--59."},{"volume-title":"Proceedings HotSec","year":"2009","author":"Jakobsson M.","key":"e_1_3_2_1_17_1","unstructured":"Jakobsson , M. , Shi , E. , Golle , P. , Chow , R. Implicit authentication for mobile devices . In Proceedings HotSec 2009 . USENIX Association, 9--9. Jakobsson, M., Shi, E., Golle, P., Chow, R. Implicit authentication for mobile devices. In Proceedings HotSec 2009. USENIX Association, 9--9."},{"volume-title":"Proceedings SSYM","year":"1999","author":"Jermyn I.","key":"e_1_3_2_1_18_1","unstructured":"Jermyn , I. , Mayer , A. , Monrose , F. , Reiter , M. K. , Rubin , A. D. The design and analysis of graphical passwords . In Proceedings SSYM 1999 . USENIX Association. Jermyn, I., Mayer, A., Monrose, F., Reiter, M. K., Rubin, A. D. The design and analysis of graphical passwords. In Proceedings SSYM 1999. USENIX Association."},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICIT.2006.372387"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1145\/1518701.1518953"},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1145\/1753326.1753489"},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1016\/S0020-7373(05)80165-8"},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICASSP.2005.1415569"},{"volume-title":"Proceedings CVPR","year":"2010","author":"Marcel S.","key":"e_1_3_2_1_24_1","unstructured":"Marcel , S. , Cool , C. , Atanasoaei , C. , Tarsetti , F. , Pes\u00e1n , J. , Matejka , P. , Cernocky , J. , Helistekangas , M. , Turtinen , M. MOBIO : mobile biometric face and speaker authentication , In Proceedings CVPR 2010 . Marcel, S., Cool, C., Atanasoaei, C., Tarsetti, F., Pes\u00e1n, J., Matejka, P., Cernocky, J., Helistekangas, M., Turtinen, M. MOBIO: mobile biometric face and speaker authentication, In Proceedings CVPR 2010."},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1037\/0278-7393.2.5.523"},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1145\/1378727.1389971"},{"volume-title":"U.S. Edition Issue 4 (Mar.","year":"2007","author":"Rogers J.","key":"e_1_3_2_1_27_1","unstructured":"Rogers , J. Please enter your four-digit pin. Financial Services Technology , U.S. Edition Issue 4 (Mar. 2007 ). Rogers, J. Please enter your four-digit pin. Financial Services Technology, U.S. Edition Issue 4 (Mar. 2007)."},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-69812-8_101"},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.1109\/TASSP.1978.1163055"},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1523\/JNEUROSCI.17-01-00409.1997"},{"key":"e_1_3_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.5555\/1949317.1949329"},{"issue":"1","key":"e_1_3_2_1_32_1","first-page":"45","article-title":"Survey of biometric recognition systems and their applications","volume":"11","author":"Sonkamble S.","year":"2010","unstructured":"Sonkamble , S. , Thool , R. , Sonkamble , B . Survey of biometric recognition systems and their applications . Journal of Theoretical and Applied Information Technology , 11 ( 1 ). ( 2010 ), 45 -- 51 . Sonkamble, S., Thool, R., Sonkamble, B. Survey of biometric recognition systems and their applications. Journal of Theoretical and Applied Information Technology, 11(1). (2010), 45--51.","journal-title":"Journal of Theoretical and Applied Information Technology"},{"volume-title":"Learning 10,000 pictures. The Quarterly Journal of Experimental Psychology, 25(2). (1973)","year":"2072","author":"Standing L.","key":"e_1_3_2_1_33_1","unstructured":"Standing , L. Learning 10,000 pictures. The Quarterly Journal of Experimental Psychology, 25(2). (1973) , 2072 2. Standing, L. Learning 10,000 pictures. The Quarterly Journal of Experimental Psychology, 25(2). (1973), 20722."},{"key":"e_1_3_2_1_34_1","doi-asserted-by":"publisher","DOI":"10.1145\/1655062.1655066"},{"key":"e_1_3_2_1_35_1","doi-asserted-by":"publisher","DOI":"10.1145\/1499402.1499410"},{"key":"e_1_3_2_1_36_1","doi-asserted-by":"publisher","DOI":"10.1145\/1463160.1463202"},{"key":"e_1_3_2_1_37_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-02830-4_25"},{"volume-title":"Proceedings Nesug","year":"2010","author":"Zhu W.","key":"e_1_3_2_1_38_1","unstructured":"Zhu , W. , Zeng , N. , Wang , N. Sensitivity , specificity, accuracy , associated confidence interval and ROC analysis with practical SAS implementations . In Proceedings Nesug 2010 . Zhu, W., Zeng, N., Wang, N. Sensitivity, specificity, accuracy, associated confidence interval and ROC analysis with practical SAS implementations. In Proceedings Nesug 2010."}],"event":{"name":"CHI '12: CHI Conference on Human Factors in Computing Systems","sponsor":["SIGCHI ACM Special Interest Group on Computer-Human Interaction"],"location":"Austin Texas USA","acronym":"CHI '12"},"container-title":["Proceedings of the SIGCHI Conference on Human Factors in Computing Systems"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/2207676.2208544","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,1,7]],"date-time":"2023-01-07T02:20:14Z","timestamp":1673058014000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2207676.2208544"}},"subtitle":["implicit authentication based on touch screen patterns"],"short-title":[],"issued":{"date-parts":[[2012,5,5]]},"references-count":38,"alternative-id":["10.1145\/2207676.2208544","10.1145\/2207676"],"URL":"http:\/\/dx.doi.org\/10.1145\/2207676.2208544","relation":{},"subject":[],"published":{"date-parts":[[2012,5,5]]},"assertion":[{"value":"2012-05-05","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}