{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,22]],"date-time":"2024-10-22T23:47:33Z","timestamp":1729640853566,"version":"3.28.0"},"reference-count":32,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2012,6]]},"DOI":"10.1109\/sere.2012.37","type":"proceedings-article","created":{"date-parts":[[2012,8,8]],"date-time":"2012-08-08T13:11:52Z","timestamp":1344431512000},"page":"245-252","source":"Crossref","is-referenced-by-count":26,"title":["A New Non-Intrusive Authentication Method Based on the Orientation Sensor for Smartphone Users"],"prefix":"10.1109","author":[{"given":"Chien-Cheng","family":"Lin","sequence":"first","affiliation":[]},{"given":"Chin-Chun","family":"Chang","sequence":"additional","affiliation":[]},{"given":"Deron","family":"Liang","sequence":"additional","affiliation":[]},{"given":"Ching-Han","family":"Yang","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"19","doi-asserted-by":"publisher","DOI":"10.1109\/34.990140"},{"journal-title":"Smartphone","year":"0","key":"17"},{"key":"18","doi-asserted-by":"publisher","DOI":"10.1016\/j.patrec.2005.04.017"},{"journal-title":"Android platform","year":"0","key":"15"},{"journal-title":"Face Recognition on Android? (4 0 Ice Cream Sandwich)","year":"0","key":"16"},{"journal-title":"Gartner Says Number of Mobile Payment Users Worldwide to Increase 70 Percent in 2009","year":"2009","key":"13"},{"journal-title":"Gartner Identifies the Top 10 Consumer Mobile Applications for 2012","year":"2009","key":"14"},{"key":"11","doi-asserted-by":"publisher","DOI":"10.1016\/S1361-3723(08)70127-1"},{"key":"12","doi-asserted-by":"publisher","DOI":"10.4304\/jcp.1.7.51-59"},{"journal-title":"Postures and Direction of Movement","year":"0","key":"21"},{"key":"20","doi-asserted-by":"publisher","DOI":"10.1108\/09685220510627269"},{"journal-title":"Professional Android 2 Application Development","year":"2010","author":"meier","key":"22"},{"key":"23","doi-asserted-by":"publisher","DOI":"10.1109\/TPAMI.2007.1002"},{"key":"24","doi-asserted-by":"publisher","DOI":"10.1109\/JPROC.2003.819611"},{"key":"25","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-69403-8_25"},{"key":"26","doi-asserted-by":"publisher","DOI":"10.1109\/WiMOB.2011.6085412"},{"journal-title":"Consumer Reports Survey on Mobile Phones and Security","year":"2011","key":"27"},{"journal-title":"Survey Says 70% Don't Password-protect Mobiles","year":"2011","author":"theriault","key":"28"},{"key":"29","doi-asserted-by":"publisher","DOI":"10.1109\/ICSNC.2007.44"},{"key":"3","doi-asserted-by":"publisher","DOI":"10.1016\/S0031-3203(01)00247-3"},{"key":"2","doi-asserted-by":"publisher","DOI":"10.1145\/581271.581272"},{"key":"10","doi-asserted-by":"publisher","DOI":"10.1080\/01621459.1997.10474007"},{"key":"1","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2007.70207"},{"journal-title":"Common Injuries","year":"0","key":"30"},{"key":"7","doi-asserted-by":"publisher","DOI":"10.1109\/IIHMSP.2010.84"},{"key":"6","doi-asserted-by":"crossref","first-page":"249","DOI":"10.1145\/1966913.1966945","article-title":"Mind how you answer me!: Transparently authenticating the user of a smartphone when answering or placing a call","author":"conti","year":"2011","journal-title":"Proceedings of the 6th ACM Symposium on Information Computer and Communications Security (ASIACCS '11)"},{"key":"32","doi-asserted-by":"publisher","DOI":"10.1049\/el:20063683"},{"key":"5","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1007\/978-3-642-01244-0_1","article-title":"Flexible and transparent user authentication for mobile devices","volume":"297","author":"clarke","year":"2009","journal-title":"IFIP Advances in Information and Communication Technology"},{"key":"31","doi-asserted-by":"publisher","DOI":"10.1109\/ICCIAS.2006.294235"},{"key":"4","doi-asserted-by":"publisher","DOI":"10.1007\/s10207-006-0006-6"},{"key":"9","first-page":"38","article-title":"User authentication schemes for mobile and handheld devices","volume":"7","author":"doja","year":"2008","journal-title":"INFOCOMP Journal of Computer Science"},{"key":"8","article-title":"Sheep, goats, lambs and wolves a statistical analysis of speaker performance in the NIST 1998 speaker recognition evaluation","author":"doddington","year":"1998","journal-title":"Int Conf Spoken Lang Process"}],"event":{"name":"2012 6th International Conference on Software Security and Reliability (SERE)","start":{"date-parts":[[2012,6,20]]},"location":"Gaithersburg, MD, USA","end":{"date-parts":[[2012,6,22]]}},"container-title":["2012 IEEE Sixth International Conference on Software Security and Reliability"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/6257299\/6258288\/06258314.pdf?arnumber=6258314","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,10,14]],"date-time":"2020-10-14T10:24:36Z","timestamp":1602671076000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/6258314"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2012,6]]},"references-count":32,"URL":"https:\/\/doi.org\/10.1109\/sere.2012.37","relation":{},"subject":[],"published":{"date-parts":[[2012,6]]}}}