{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,11]],"date-time":"2024-09-11T18:38:30Z","timestamp":1726079910000},"publisher-location":"Cham","reference-count":7,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783030450953"},{"type":"electronic","value":"9783030450960"}],"license":[{"start":{"date-parts":[[2020,1,1]],"date-time":"2020-01-01T00:00:00Z","timestamp":1577836800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2020]]},"DOI":"10.1007\/978-3-030-45096-0_62","type":"book-chapter","created":{"date-parts":[[2020,4,14]],"date-time":"2020-04-14T23:03:45Z","timestamp":1586905425000},"page":"508-512","update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Authentication of Internet Connected White Goods Using Gestures or Key Sequences"],"prefix":"10.1007","author":[{"given":"Thomas","family":"Schlechter","sequence":"first","affiliation":[]},{"given":"Johannes","family":"Fischer","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2020,4,15]]},"reference":[{"unstructured":"European Parliament: \u201cVerordnung (EU) 2016\/679 des Europaeischen Parlaments und des Rates vom 27. April 2016 zum Schutz natuerlicher Personen bei der Verarbeitung personenbezogener Daten, zum freien Datenverkehr und zur Aufhebung der Richtlinie 95\/46\/EG (DSGVO).\u201d European Union (2016)","key":"62_CR1"},{"key":"62_CR2","doi-asserted-by":"publisher","first-page":"568","DOI":"10.1109\/TIFS.2014.2302582","volume":"9","author":"N Sae-Bae","year":"2014","unstructured":"Sae-Bae, N., Memon, N., Isbister, K., Ahmed, K.: Multitouch gesture-based authentication. IEEE Trans. Inf. Forensics Secur. 9, 568\u2013582 (2014)","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"doi-asserted-by":"crossref","unstructured":"Lai, K., Konrad, J., Ishwar, P.: Towards gesture-based user authentication. In: Proceedings of the Ninth International Conference on Advanced Video and Signal-Based Surveillance, pp. 282\u2013287. IEEE (2012)","key":"62_CR3","DOI":"10.1109\/AVSS.2012.77"},{"unstructured":"Hito, G., Madrid, T.R.: Smart Device User Authentication, US patentus US20,110,219,427A1 (2011). \nhttps:\/\/patents.google.com\/patent\/US20110219427A1\/en","key":"62_CR4"},{"unstructured":"White, C.: System and method for authenticating products, US patentus US20,070,234,058A1 (2007). \nhttps:\/\/patents.google.com\/patent\/US20070234058A1\/en","key":"62_CR5"},{"unstructured":"Venkatha Raghavan, S.: Methods and devices for pattern-based user authentication, US patentus US8,191,126B2 (2012) \nhttps:\/\/patents.google.com\/patent\/US8191126B2\/en","key":"62_CR6"},{"doi-asserted-by":"crossref","unstructured":"Saevanee, H., Bhatarakosol, P.: User authentication using combination of behavioral biometrics over the touchpad acting like touch screen of mobile device. In: Proceedings of the International Conference on Computer and Electrical Engineering, pp. 82\u201386. IEEE (2008)","key":"62_CR7","DOI":"10.1109\/ICCEE.2008.157"}],"container-title":["Lecture Notes in Computer Science","Computer Aided Systems Theory \u2013 EUROCAST 2019"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-45096-0_62","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,4,14]],"date-time":"2020-04-14T23:23:17Z","timestamp":1586906597000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-030-45096-0_62"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020]]},"ISBN":["9783030450953","9783030450960"],"references-count":7,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-45096-0_62","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2020]]},"assertion":[{"value":"15 April 2020","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"EUROCAST","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Computer Aided Systems Theory","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Las Palmas de Gran Canaria","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Spain","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2019","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"17 February 2019","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"22 February 2019","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"17","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"eurocast2019","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/eurocast2019.fulp.ulpgc.es\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}