{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,23]],"date-time":"2024-10-23T05:26:42Z","timestamp":1729661202483,"version":"3.28.0"},"reference-count":38,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2014,10]]},"DOI":"10.1109\/icnp.2014.43","type":"proceedings-article","created":{"date-parts":[[2014,12,30]],"date-time":"2014-12-30T21:51:41Z","timestamp":1419976301000},"page":"221-232","source":"Crossref","is-referenced-by-count":177,"title":["You Are How You Touch: User Verification on Smartphones via Tapping Behaviors"],"prefix":"10.1109","author":[{"given":"Nan","family":"Zheng","sequence":"first","affiliation":[]},{"given":"Kun","family":"Bai","sequence":"additional","affiliation":[]},{"given":"Hai","family":"Huang","sequence":"additional","affiliation":[]},{"given":"Haining","family":"Wang","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"19","first-page":"201","article-title":"Keystroke biometrics with numberpad input","author":"maxion","year":"2010","journal-title":"IEEE DSN'10"},{"key":"35","doi-asserted-by":"crossref","first-page":"249","DOI":"10.1145\/1966913.1966945","article-title":"Mind how you answer me!: Transparently authenticating the user of a smartphone when answering or placing a call","author":"conti","year":"2011","journal-title":"ASIACCS'11"},{"journal-title":"Apple Inc","year":"0","key":"17"},{"key":"36","doi-asserted-by":"publisher","DOI":"10.1145\/2207676.2208543"},{"journal-title":"Chaos Computer Club","year":"2013","key":"18"},{"key":"33","doi-asserted-by":"publisher","DOI":"10.1109\/IWSCN.2011.6827712"},{"key":"15","doi-asserted-by":"publisher","DOI":"10.1109\/FG.2011.5771424"},{"key":"34","doi-asserted-by":"crossref","first-page":"39","DOI":"10.1145\/2500423.2500434","article-title":"Secure unlocking of mobile touch screen devices by simple gestures: You can see it but you can not do it","author":"shahzad","year":"2013","journal-title":"MobiCom '13"},{"key":"16","doi-asserted-by":"publisher","DOI":"10.1145\/2207676.2208544"},{"key":"13","doi-asserted-by":"crossref","first-page":"48","DOI":"10.1145\/266420.266434","article-title":"Authentication via keystroke dynamics","author":"monrose","year":"1997","journal-title":"ACM CCS'97"},{"key":"14","doi-asserted-by":"publisher","DOI":"10.1145\/2046707.2046725"},{"journal-title":"TAPI Touch-screen Authentication Using Partitioned Images","year":"2010","author":"citty","key":"37"},{"key":"11","doi-asserted-by":"publisher","DOI":"10.1145\/1101149.1101185"},{"key":"38","doi-asserted-by":"publisher","DOI":"10.1145\/1753326.1753489"},{"key":"12","article-title":"Authentication using pulse-response biometrics","author":"rasmussen","year":"2014","journal-title":"NDSS'10"},{"key":"21","doi-asserted-by":"publisher","DOI":"10.1109\/TCSVT.2003.818349"},{"journal-title":"Basic Statistial Analysis","year":"2011","author":"sprinthall","key":"20"},{"key":"22","doi-asserted-by":"publisher","DOI":"10.1145\/2380116.2380184"},{"key":"23","doi-asserted-by":"publisher","DOI":"10.1145\/581271.581272"},{"key":"24","doi-asserted-by":"publisher","DOI":"10.1109\/DSN.2009.5270346"},{"key":"25","doi-asserted-by":"publisher","DOI":"10.1002\/9780470997949"},{"key":"26","doi-asserted-by":"crossref","first-page":"73","DOI":"10.1145\/319709.319720","article-title":"Password hardening based on keystroke dynamics","author":"monrose","year":"1999","journal-title":"ACM CCS'99"},{"key":"27","doi-asserted-by":"publisher","DOI":"10.1007\/s102070100006"},{"key":"28","doi-asserted-by":"publisher","DOI":"10.1007\/s10207-006-0006-6"},{"key":"29","doi-asserted-by":"crossref","first-page":"253","DOI":"10.1007\/978-0-387-72367-9_22","article-title":"Keystroke analysis for thumb-based keyboards on mobile devices","author":"karatzouni","year":"2007","journal-title":"New Approaches for Security Privacy and Trust in Complex Environments"},{"key":"3","doi-asserted-by":"publisher","DOI":"10.1145\/2307636.2307666"},{"key":"2","article-title":"Touchlogger: Inferring keystrokes on touch screen from smartphone motion","author":"cai","year":"2011","journal-title":"HotSec'11"},{"key":"10","doi-asserted-by":"crossref","first-page":"430","DOI":"10.1155\/S1110865704310024","article-title":"A tutorial on text-independent speaker verification","volume":"2004","author":"bimbot","year":"2004","journal-title":"EURASIP J Appl Signal Process"},{"journal-title":"Most Common iPhone Passcodes","year":"0","author":"amitay","key":"1"},{"key":"30","first-page":"224","article-title":"Keystroke-based user identification on smart phones","author":"zahid","year":"2009","journal-title":"RAID'09"},{"key":"7","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2012.2225048"},{"key":"6","first-page":"1","article-title":"Smudge attacks on smartphone touch screens","author":"aviv","year":"2010","journal-title":"WOOT'10"},{"key":"32","doi-asserted-by":"publisher","DOI":"10.1109\/IIHMSP.2010.83"},{"key":"5","doi-asserted-by":"publisher","DOI":"10.1145\/2185448.2185465"},{"key":"31","doi-asserted-by":"publisher","DOI":"10.1007\/s10207-012-0154-9"},{"key":"4","doi-asserted-by":"publisher","DOI":"10.1145\/2162081.2162095"},{"key":"9","doi-asserted-by":"crossref","first-page":"331","DOI":"10.1007\/978-3-642-38519-3_21","article-title":"Touch gestures based biometric authentication scheme for touchscreen mobile phones","volume":"7763","author":"meng","year":"2013","journal-title":"Information Security and Cryptology"},{"key":"8","article-title":"Unobservable re-Authentication for smartphones","author":"li","year":"2013","journal-title":"NDSS' 13"}],"event":{"name":"2014 IEEE 22nd International Conference on Network Protocols (ICNP)","start":{"date-parts":[[2014,10,21]]},"location":"Raleigh, NC, USA","end":{"date-parts":[[2014,10,24]]}},"container-title":["2014 IEEE 22nd International Conference on Network Protocols"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6975723\/6980338\/06980382.pdf?arnumber=6980382","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,10,14]],"date-time":"2020-10-14T14:26:13Z","timestamp":1602685573000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/6980382"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014,10]]},"references-count":38,"URL":"https:\/\/doi.org\/10.1109\/icnp.2014.43","relation":{},"subject":[],"published":{"date-parts":[[2014,10]]}}}