{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,10]],"date-time":"2024-09-10T21:18:03Z","timestamp":1726003083537},"publisher-location":"Cham","reference-count":23,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783030053444"},{"type":"electronic","value":"9783030053451"}],"license":[{"start":{"date-parts":[[2018,1,1]],"date-time":"2018-01-01T00:00:00Z","timestamp":1514764800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2018]]},"DOI":"10.1007\/978-3-030-05345-1_1","type":"book-chapter","created":{"date-parts":[[2018,12,7]],"date-time":"2018-12-07T14:07:56Z","timestamp":1544191676000},"page":"3-14","update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Protecting Your Smartphone from Theft Using Accelerometer"],"prefix":"10.1007","author":[{"given":"Huiyong","family":"Li","sequence":"first","affiliation":[]},{"given":"Jiannan","family":"Yu","sequence":"additional","affiliation":[]},{"given":"Qian","family":"Cao","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2018,12,7]]},"reference":[{"key":"1_CR1","doi-asserted-by":"crossref","unstructured":"B\u00f6hmer, M., Hecht, B.J., Sch\u00f6ning, J., Kr\u00fcger, A., Bauer, G.: Falling asleep with angry birds, Facebook and kindle: a large scale study on mobile application usage. In: Proceedings of the 13th International Conference on Human Computer Interaction with Mobile Devices and Services, pp. 47\u201356 (2011)","DOI":"10.1145\/2037373.2037383"},{"key":"1_CR2","doi-asserted-by":"crossref","unstructured":"Lee, W.-H., Lee, R.B.: Implicit sensor-based authentication of smartphone users with smartwatch. In: Proceedings of the Hardware and Architectural Support for Security and Privacy 2016, p. 9 (2016)","DOI":"10.1145\/2948618.2948627"},{"key":"1_CR3","unstructured":"Consumer Reports 2013: Keep your phone safe: how to protect yourself from wireless threats. Consumer reports, Technical (2013)"},{"key":"1_CR4","unstructured":"Harbach, M., Von Zezschwitz, E., Fichtner, A., De Luca, A., Smith, M.: It\u2019s a hard lock life: a field study of smartphone (un)locking behavior and risk perception. In: Symposium On Usable Privacy and Security (SOUPS 2014), pp. 213\u2013230 (2014)"},{"key":"1_CR5","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"99","DOI":"10.1007\/978-3-642-18178-8_9","volume-title":"Information Security","author":"E Shi","year":"2011","unstructured":"Shi, E., Niu, Y., Jakobsson, M., Chow, R.: Implicit authentication through learning user behavior. In: Burmester, M., Tsudik, G., Magliveras, S., Ili\u0107, I. (eds.) ISC 2010. LNCS, vol. 6531, pp. 99\u2013113. Springer, Heidelberg (2011). \nhttps:\/\/doi.org\/10.1007\/978-3-642-18178-8_9"},{"key":"1_CR6","doi-asserted-by":"crossref","unstructured":"Schaub, F., Deyhle, R., Weber, M.: Password entry usability and shoulder surfing susceptibility on different smartphone platforms. In: Proceedings of the 11th International Conference on Mobile and Ubiquitous Multimedia, p. 13 (2012)","DOI":"10.1145\/2406367.2406384"},{"key":"1_CR7","unstructured":"Spencer, B.: Mobile users can\u2019t leave their phone alone for six minutes and check it up to 150 times a day. \nhttp:\/\/www.dailymail.co.uk\/news\/article-2276752\/Mobile-users-leave-phone-minutes-check-150-times-day.Html"},{"key":"1_CR8","doi-asserted-by":"crossref","unstructured":"Falaki, H., Mahajan, R., Kandula, S., Lymberopoulos, D., Govindan, R., Estrin, D.: Diversity in smartphone usage. In: Proceedings of the 8th International Conference on Mobile Systems, Applications, and Services, pp. 179\u2013194 (2010)","DOI":"10.1145\/1814433.1814453"},{"key":"1_CR9","doi-asserted-by":"crossref","unstructured":"Weir, M., Aggarwal, S., De Medeiros, B., Glodek, B.: Password cracking using probabilistic context-free grammars. In: 2009 30th IEEE Symposium on Security and Privacy, pp. 391\u2013405 (2009)","DOI":"10.1109\/SP.2009.8"},{"key":"1_CR10","doi-asserted-by":"crossref","unstructured":"Bonneau, J.: The science of guessing: analyzing an anonymized corpus of 70 million passwords. In: 2012 IEEE Symposium on Security and Privacy, pp. 538\u2013552 (2012)","DOI":"10.1109\/SP.2012.49"},{"key":"1_CR11","doi-asserted-by":"crossref","unstructured":"Kelley, P.G., et al.: Guess again (and again and again): measuring password strength by simulating password-cracking algorithms. In: 2012 IEEE Symposium on Security and Privacy, pp. 523\u2013537 (2012)","DOI":"10.1109\/SP.2012.38"},{"issue":"11","key":"1_CR12","doi-asserted-by":"publisher","first-page":"3209","DOI":"10.1109\/TMC.2017.2686855","volume":"16","author":"M Muaaz","year":"2017","unstructured":"Muaaz, M., Mayrhofer, R.: Smartphone-based gait recognition: from authentication to imitation. IEEE Trans. Mob. Comput. 16(11), 3209\u20133221 (2017)","journal-title":"IEEE Trans. Mob. Comput."},{"key":"1_CR13","unstructured":"Singha, T.B., Nath, R.K., Narsimhadhan, A.V.: Person recognition using smartphones\u2019 accelerometer data (2017)"},{"key":"1_CR14","doi-asserted-by":"crossref","unstructured":"Buriro, A., Crispo, B., Delfrari, F., Wrona, K.: Hold and sign: a novel behavioral biometrics for smartphone user authentication. In: 2016 IEEE Security and Privacy Workshops (SPW), pp. 276\u2013285 (2016)","DOI":"10.1109\/SPW.2016.20"},{"issue":"5","key":"1_CR15","doi-asserted-by":"publisher","first-page":"877","DOI":"10.1109\/TIFS.2015.2506542","volume":"11","author":"Z Sitova","year":"2016","unstructured":"Sitova, Z., et al.: HMOG: new behavioral biometric features for continuous authentication of smartphone users. IEEE Trans. Inf. Forensics Secur. 11(5), 877\u2013892 (2016)","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"issue":"10","key":"1_CR16","doi-asserted-by":"publisher","first-page":"2901","DOI":"10.1109\/TMC.2017.2651820","volume":"16","author":"H Zhu","year":"2017","unstructured":"Zhu, H., Jingmei, H., Chang, S., Li, L.: Shakein: secure user authentication of smartphones with single-handed shakes. IEEE Trans. Mob. Comput. 16(10), 2901\u20132912 (2017)","journal-title":"IEEE Trans. Mob. Comput."},{"key":"1_CR17","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"27","DOI":"10.1007\/978-3-319-23222-5_4","volume-title":"New Trends in Image Analysis and Processing \u2013 ICIAP 2015 Workshops","author":"A Buriro","year":"2015","unstructured":"Buriro, A., Crispo, B., Del Frari, F., Wrona, K.: Touchstroke: smartphone user authentication based on touch-typing biometrics. In: Murino, V., Puppo, E., Sona, D., Cristani, M., Sansone, C. (eds.) ICIAP 2015. LNCS, vol. 9281, pp. 27\u201334. Springer, Cham (2015). \nhttps:\/\/doi.org\/10.1007\/978-3-319-23222-5_4"},{"issue":"8","key":"1_CR18","doi-asserted-by":"publisher","first-page":"10701","DOI":"10.1007\/s11042-015-3188-y","volume":"76","author":"Y Lu","year":"2017","unstructured":"Lu, Y., Wei, Y., Liu, L., Zhong, J., Sun, L., Liu, Y.: Towards unsupervised physical activity recognition using smartphone accelerometers. Multimedia Tools Appl. 76(8), 10701\u201310719 (2017)","journal-title":"Multimedia Tools Appl."},{"key":"1_CR19","doi-asserted-by":"crossref","unstructured":"Kwapisz, J.R., Weiss, G.M., Moore, S.A.: Cell phone-based biometric identification. In: 2010 Fourth IEEE International Conference on Biometrics: Theory, Applications and Systems (BTAS), pp. 1\u20137 (2010)","DOI":"10.1109\/BTAS.2010.5634532"},{"key":"1_CR20","doi-asserted-by":"crossref","unstructured":"Alvarez, D., Gonz\u00e1lez, R.C., L\u00f3pez, A., Alvarez, J.C.: Comparison of step length estimators from weareable accelerometer devices. In: Conference Proceedings: Annual International Conference of the IEEE Engineering in Medicine and Biology Society. IEEE Engineering in Medicine and Biology Society. Annual Conference, vol. 1, pp. 5964\u20135967 (2006)","DOI":"10.1109\/IEMBS.2006.259593"},{"key":"1_CR21","doi-asserted-by":"crossref","unstructured":"Sekine, M., et al.: Assessment of gait parameter in hemiplegic patients by accelerometry. In: Proceedings of the 22nd Annual International Conference of the IEEE Engineering in Medicine and Biology Society (Cat. No. 00CH37143), vol. 3, pp. 1879\u20131882 (2000)","DOI":"10.1109\/IEMBS.2000.900456"},{"key":"1_CR22","doi-asserted-by":"crossref","unstructured":"Hemminki, S., Nurmi, P., Tarkoma, S.: Accelerometer-based transportation mode detection on smartphones. In: Proceedings of the 11th ACM Conference on Embedded Networked Sensor Systems, p. 13 (2013)","DOI":"10.1145\/2517351.2517367"},{"issue":"2","key":"1_CR23","doi-asserted-by":"publisher","first-page":"13","DOI":"10.1145\/1689239.1689243","volume":"6","author":"S Reddy","year":"2010","unstructured":"Reddy, S., Mun, M., Burke, J., Estrin, D., Hansen, M., Srivastava, M.: Using mobile phones to determine transportation modes. ACM Trans. Sensor Netw. 6(2), 13 (2010)","journal-title":"ACM Trans. Sensor Netw."}],"container-title":["Lecture Notes in Computer Science","Security, Privacy, and Anonymity in Computation, Communication, and Storage"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-05345-1_1","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2018,12,7]],"date-time":"2018-12-07T14:08:19Z","timestamp":1544191699000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-030-05345-1_1"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018]]},"ISBN":["9783030053444","9783030053451"],"references-count":23,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-05345-1_1","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2018]]},"assertion":[{"value":"SpaCCS","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Security, Privacy and Anonymity in Computation, Communication and Storage","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Melbourne, NSW","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Australia","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2018","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"11 December 2018","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"13 December 2018","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"11","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"spaccs2018","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/space2018.cse.iitk.ac.in\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}