{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,2,21]],"date-time":"2025-02-21T00:57:26Z","timestamp":1740099446242,"version":"3.37.3"},"publisher-location":"Cham","reference-count":21,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783030243074"},{"type":"electronic","value":"9783030243081"}],"license":[{"start":{"date-parts":[[2019,1,1]],"date-time":"2019-01-01T00:00:00Z","timestamp":1546300800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2019]]},"DOI":"10.1007\/978-3-030-24308-1_16","type":"book-chapter","created":{"date-parts":[[2019,6,28]],"date-time":"2019-06-28T07:03:03Z","timestamp":1561705383000},"page":"190-202","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Context Data Preprocessing for Context-Aware Smartphone Authentication"],"prefix":"10.1007","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-4575-8371","authenticated-orcid":false,"given":"Sangjin","family":"Nam","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-4228-3059","authenticated-orcid":false,"given":"Suntae","family":"Kim","sequence":"additional","affiliation":[]},{"given":"Jung-Hoon","family":"Shin","sequence":"additional","affiliation":[]},{"given":"Jeong Ah","family":"Kim","sequence":"additional","affiliation":[]},{"given":"Sooyong","family":"Park","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2019,6,29]]},"reference":[{"key":"16_CR1","doi-asserted-by":"crossref","unstructured":"Herley, C.: So long, and no thanks for the externalities: the rational rejection of security advice by users. In: Proceedings of SACMAT (2009)","DOI":"10.1145\/1719030.1719050"},{"key":"16_CR2","doi-asserted-by":"crossref","unstructured":"Hulsebosch, J.R., Salden, H.A., Bargh, S.M., Ebben, P.W.G., Reitsma, J.: Context sensitive access control. In: Proceedings of SACMAT (2005)","DOI":"10.1145\/1063979.1064000"},{"key":"16_CR3","unstructured":"Nachenberg, C.: A window into mobile device security: examining the security approaches employ. SSR (2011)"},{"key":"16_CR4","unstructured":"Whitney, L.: Smartphones to dominate PCs in Gartner forecast. CNET Business Tech News (2010)"},{"key":"16_CR5","unstructured":"Rainie, L., Anderson, J.: The Future of the Internet III. Pew Internet Project (2008)"},{"key":"16_CR6","doi-asserted-by":"crossref","unstructured":"Zhang, F., Kondoro, A., Muftic, S.: Location-based authentication and authorization using smartphone. TrustCom (2012)","DOI":"10.1109\/TrustCom.2012.198"},{"key":"16_CR7","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"99","DOI":"10.1007\/978-3-642-18178-8_9","volume-title":"Information Security","author":"E Shi","year":"2011","unstructured":"Shi, E., Niu, Y., Jakobsson, M., Chow, R.: Implicit authentication through learning user behavior. In: Burmester, M., Tsudik, G., Magliveras, S., Ili\u0107, I. (eds.) ISC 2010. LNCS, vol. 6531, pp. 99\u2013113. Springer, Heidelberg (2011). \n                      https:\/\/doi.org\/10.1007\/978-3-642-18178-8_9"},{"key":"16_CR8","unstructured":"Markus, J., Shi, E., Golle, P., Chow, R.: Implicit authentication for mobile devices. USENIX (2009)"},{"key":"16_CR9","unstructured":"Hilmi, G.K., Just, M., Baillie, L., Aspinall, D., Micallef, N.: Data driven authentication: on the effectiveness of user behaviour modelling with mobile device sensors. MoST (2014)"},{"issue":"11","key":"16_CR10","doi-asserted-by":"publisher","first-page":"770","DOI":"10.1145\/358790.358797","volume":"24","author":"L Lamport","year":"1981","unstructured":"Lamport, L.: Password authentication with insecure communication. Commun. ACM 24(11), 770\u2013772 (1981)","journal-title":"Commun. ACM"},{"issue":"4","key":"16_CR11","doi-asserted-by":"publisher","first-page":"1292","DOI":"10.1016\/j.jnca.2011.02.004","volume":"34","author":"C-Y Huang","year":"2011","unstructured":"Huang, C.-Y., Ma, S.-P., Chen, K.-T.: Using one-time passwords to prevent password phishing attacks. J. Netw. Comput. Appl. 34(4), 1292\u20131301 (2011)","journal-title":"J. Netw. Comput. Appl."},{"issue":"5","key":"16_CR12","doi-asserted-by":"publisher","first-page":"487","DOI":"10.1002\/sec.225","volume":"4","author":"K Xi","year":"2011","unstructured":"Xi, K., et al.: A fingerprint based bio-cryptographic security protocol designed for client\/server authentication in mobile computing environment. Secur. Commun. Netw. 4(5), 487\u2013499 (2011)","journal-title":"Secur. Commun. Netw."},{"issue":"11","key":"16_CR13","first-page":"246","volume":"5","author":"A Nilesh","year":"2016","unstructured":"Nilesh, A., Salendra, P., et al.: A review of authentication methods. Int. J. Sci. Technol. Res. 5(11), 246\u2013249 (2016)","journal-title":"Int. J. Sci. Technol. Res."},{"key":"16_CR14","first-page":"93","volume":"3","author":"R Bhatia","year":"2013","unstructured":"Bhatia, R.: Biometrics and face recognition techniques. Int. J. Adv. Res. Comput. Sci. Softw. Eng. 3, 93\u201396 (2013)","journal-title":"Int. J. Adv. Res. Comput. Sci. Softw. Eng."},{"key":"16_CR15","first-page":"34","volume":"1","author":"N Kak","year":"2010","unstructured":"Kak, N., Gupta, R.: Iris recognition system. Int. J. Adv. Comput. Sci. Appl. 1, 34\u201340 (2010)","journal-title":"Int. J. Adv. Comput. Sci. Appl."},{"key":"16_CR16","unstructured":"Hartigan, J.A., Wong, M.A.: A k-means clustering algorithm. J. Roy. Stat. Soc. Ser. C (Appl. Stat.) 28(1), 100\u2013108 (1979)"},{"key":"16_CR17","doi-asserted-by":"publisher","first-page":"7","DOI":"10.1007\/BF01890115","volume":"1","author":"HED William","year":"1984","unstructured":"William, H.E.D., Edelsbrunner, H.: Efficient algorithms for agglomerative hierarchical clustering methods. J. Classif. 1, 7\u201324 (1984)","journal-title":"J. Classif."},{"key":"16_CR18","unstructured":"Snedecor, G.W., Cochran, W.G.: Statistical Methods. 8th edn. Lowa state University Press (1989)"},{"key":"16_CR19","first-page":"1239","volume":"14","author":"Q Shen","year":"2004","unstructured":"Shen, Q., Faraway, J.: An f test for linear models with functional responses. Statistica Sinica 14, 1239\u20131257 (2004)","journal-title":"Statistica Sinica"},{"key":"16_CR20","unstructured":"Mobile Data Challenge (MDC) Dataset: Dataset Distribution Portal. \n                      https:\/\/www.idiap.ch\/dataset\/mdc\n                      \n                    . Accessed 6 Feb 2019"},{"issue":"6","key":"16_CR21","doi-asserted-by":"publisher","first-page":"38","DOI":"10.1109\/65.806987","volume":"13","author":"R Perlman","year":"1999","unstructured":"Perlman, R.: An overview of PKI trust models. IEEE Netw. 13(6), 38\u201343 (1999)","journal-title":"IEEE Netw."}],"container-title":["Lecture Notes in Computer Science","Computational Science and Its Applications \u2013 ICCSA 2019"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-24308-1_16","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,6,28]],"date-time":"2019-06-28T07:07:16Z","timestamp":1561705636000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-030-24308-1_16"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019]]},"ISBN":["9783030243074","9783030243081"],"references-count":21,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-24308-1_16","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2019]]},"assertion":[{"value":"29 June 2019","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"ICCSA","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Computational Science and Its Applications","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Saint Petersburg","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Russia","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2019","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"1 July 2019","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"4 July 2019","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"19","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"iccsa2019","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/www.iccsa.org\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}