{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,25]],"date-time":"2025-03-25T20:36:30Z","timestamp":1742934990847,"version":"3.40.3"},"publisher-location":"Cham","reference-count":23,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783030453848"},{"type":"electronic","value":"9783030453855"}],"license":[{"start":{"date-parts":[[2020,1,1]],"date-time":"2020-01-01T00:00:00Z","timestamp":1577836800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2020,1,1]],"date-time":"2020-01-01T00:00:00Z","timestamp":1577836800000},"content-version":"vor","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2020]]},"DOI":"10.1007\/978-3-030-45385-5_31","type":"book-chapter","created":{"date-parts":[[2020,5,27]],"date-time":"2020-05-27T12:13:38Z","timestamp":1590581618000},"page":"350-361","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Pin-Code Authentication by Local Proximity Based Touchstroke Classifier"],"prefix":"10.1007","author":[{"given":"Orcan","family":"Alpar","sequence":"first","affiliation":[]},{"given":"Ondrej","family":"Krejcar","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2020,4,30]]},"reference":[{"key":"31_CR1","doi-asserted-by":"publisher","first-page":"71","DOI":"10.1016\/j.future.2018.03.030","volume":"86","author":"O Alpar","year":"2018","unstructured":"Alpar, O.: Biometric touchstroke authentication by fuzzy proximity of touch locations. Future Gener. Comput. Syst. 86, 71\u201380 (2018)","journal-title":"Future Gener. Comput. Syst."},{"key":"31_CR2","doi-asserted-by":"publisher","unstructured":"Sarier, N.D.: Multimodal biometric identity based encryption. Future Gener. Comput. Syst. (2017). \nhttps:\/\/doi.org\/10.1016\/j.future.2017.09.078","DOI":"10.1016\/j.future.2017.09.078"},{"issue":"2","key":"31_CR3","first-page":"1","volume":"28","author":"CJ Kroeze","year":"2016","unstructured":"Kroeze, C.J., Malan, K.M.: User authentication based on continuous touch biometrics. S. Afr. Comput. J. 28(2), 1\u201323 (2016)","journal-title":"S. Afr. Comput. J."},{"key":"31_CR4","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1016\/j.neucom.2016.11.031","volume":"230","author":"S Mondal","year":"2017","unstructured":"Mondal, S., Bours, P.: A study on continuous authentication using a combination of keystroke and mouse biometrics. Neurocomputing 230, 1\u201322 (2017)","journal-title":"Neurocomputing"},{"key":"31_CR5","doi-asserted-by":"crossref","unstructured":"Alshanketi, F., Traore, I., Ahmed, A.A.: Improving performance and usability in mobile keystroke dynamic biometric authentication. In: Security and Privacy Workshops (SPW). IEEE (2016)","DOI":"10.1109\/SPW.2016.12"},{"key":"31_CR6","doi-asserted-by":"publisher","first-page":"163","DOI":"10.1016\/j.knosys.2016.11.006","volume":"116","author":"O Alpar","year":"2017","unstructured":"Alpar, O.: Frequency spectrograms for biometric keystroke authentication using neural network based classifier. Knowl.-Based Syst. 116, 163\u2013171 (2017)","journal-title":"Knowl.-Based Syst."},{"issue":"1","key":"31_CR7","doi-asserted-by":"publisher","first-page":"7","DOI":"10.1186\/s42400-018-0009-4","volume":"1","author":"B Chang","year":"2018","unstructured":"Chang, B., Li, Y., Wang, Q., Zhu, W.T., Deng, R.H.: Making a good thing better: enhancing password\/PIN-based user authentication with smartwatch. Cybersecurity 1(1), 7 (2018)","journal-title":"Cybersecurity"},{"key":"31_CR8","series-title":"Advances in Intelligent Systems and Computing","doi-asserted-by":"publisher","first-page":"555","DOI":"10.1007\/978-981-13-0923-6_48","volume-title":"Machine Intelligence and Signal Analysis","author":"Suraj","year":"2019","unstructured":"Suraj, Sarma, P., Yadav, A.K., Barma, S.: Keystroke rhythm analysis based on dynamics of fingertips. In: Tanveer, M., Pachori, R. (eds.) Machine Intelligence and Signal Analysis. Advances in Intelligent Systems and Computing, pp. 555\u2013567. Springer, Singapore (2019). \nhttps:\/\/doi.org\/10.1007\/978-981-13-0923-6_48"},{"key":"31_CR9","series-title":"Lecture Notes in Networks and Systems","doi-asserted-by":"publisher","first-page":"25","DOI":"10.1007\/978-981-13-1217-5_3","volume-title":"Proceedings of 2nd International Conference on Communication, Computing and Networking","author":"BS Saini","year":"2019","unstructured":"Saini, B.S., Kaur, N., Bhatia, K.S.: Authenticating mobile phone users based on their typing position using keystroke dynamics. In: Krishna, C.R., Dutta, M., Kumar, R. (eds.) Proceedings of 2nd International Conference on Communication, Computing and Networking. LNNS, vol. 46, pp. 25\u201333. Springer, Singapore (2019). \nhttps:\/\/doi.org\/10.1007\/978-981-13-1217-5_3"},{"key":"31_CR10","doi-asserted-by":"publisher","first-page":"213","DOI":"10.1016\/j.engappai.2013.11.009","volume":"32","author":"O Alpar","year":"2014","unstructured":"Alpar, O.: Keystroke recognition in user authentication using ANN based RGB histogram technique. Eng. Appl. Artif. Intell. 32, 213\u2013217 (2014)","journal-title":"Eng. Appl. Artif. Intell."},{"key":"31_CR11","doi-asserted-by":"crossref","unstructured":"Roh, J.H., Lee, S.H., Kim, S.: Keystroke dynamics for authentication in smartphone. In: International Conference on Information and Communication Technology Convergence (ICTC). IEEE (2016)","DOI":"10.1109\/ICTC.2016.7763394"},{"key":"31_CR12","doi-asserted-by":"publisher","first-page":"426","DOI":"10.1016\/j.eswa.2019.06.057","volume":"136","author":"O Alpar","year":"2019","unstructured":"Alpar, O.: TAPSTROKE: a novel intelligent authentication system using tap frequencies. Expert Syst. Appl. 136, 426\u2013438 (2019)","journal-title":"Expert Syst. Appl."},{"key":"31_CR13","doi-asserted-by":"crossref","unstructured":"De Luca, A., Hang, A., Brudy, F., Lindner, C., Hussmann, H.: Touch me once and i know it\u2019s you!: implicit authentication based on touch screen patterns. In: CHI 2012 Proceedings of the 2012 ACM Annual Conference on Human Factors in Computing Systems, New York (2012)","DOI":"10.1145\/2207676.2208544"},{"key":"31_CR14","doi-asserted-by":"crossref","unstructured":"Sae-Bae, N., Ahmed, K., Isbister, K., Memon, N.: Biometric-rich gestures: a novel approach to authentication on multi-touch devices. In: CHI 2012 Proceedings of the 2012 ACM Annual Conference on Human Factors in Computing Systems, New York (2012)","DOI":"10.1145\/2207676.2208543"},{"issue":"5","key":"31_CR15","doi-asserted-by":"publisher","first-page":"1157","DOI":"10.1016\/j.jss.2011.12.044","volume":"85","author":"TY Chang","year":"2012","unstructured":"Chang, T.Y., Tsai, C.J., Lin, J.H.: A graphical-based password keystroke dynamic authentication system for touch screen handheld mobile devices. J. Syst. Softw. 85(5), 1157\u20131165 (2012)","journal-title":"J. Syst. Softw."},{"key":"31_CR16","doi-asserted-by":"crossref","unstructured":"Alsultan, A., Warwick, K.: User-friendly free-text keystroke dynamics authentication for practical applications. In: 2013 IEEE International Conference on Systems, Man, and Cybernetics (SMC). IEEE (2013)","DOI":"10.1109\/SMC.2013.793"},{"issue":"4","key":"31_CR17","doi-asserted-by":"publisher","first-page":"458","DOI":"10.1109\/TCYB.2013.2257745","volume":"44","author":"AA Ahmed","year":"2014","unstructured":"Ahmed, A.A., Traore, I.: Biometric recognition based on free-text keystroke dynamics. IEEE Trans. Cybern. 44(4), 458\u2013472 (2014)","journal-title":"IEEE Trans. Cybern."},{"issue":"17","key":"31_CR18","doi-asserted-by":"publisher","first-page":"6286","DOI":"10.1016\/j.eswa.2015.04.052","volume":"42","author":"O Alpar","year":"2015","unstructured":"Alpar, O.: Intelligent biometric pattern password authentication systems for touchscreens. Expert Syst. Appl. 42(17), 6286\u20136294 (2015)","journal-title":"Expert Syst. Appl."},{"key":"31_CR19","doi-asserted-by":"crossref","unstructured":"Alpar, O., Krejcar, O.: Biometric swiping on touchscreens. In: Computer Information Systems and Industrial Management (2015)","DOI":"10.1007\/978-3-319-24369-6_16"},{"key":"31_CR20","doi-asserted-by":"crossref","unstructured":"Alpar, O., Krejcar, O.: Pattern password authentication based on touching location. In: Intelligent Data Engineering and Automated Learning\u2013IDEAL 2015 (2015)","DOI":"10.1007\/978-3-319-24834-9_46"},{"key":"31_CR21","doi-asserted-by":"crossref","unstructured":"Buschek, D., De Luca, A., Alt, F.: Improving accuracy, applicability and usability of keystroke biometrics on mobile touchscreen devices. In: Proceedings of the 33rd Annual ACM Conference on Human Factors in Computing Systems. ACM (2015)","DOI":"10.1145\/2702123.2702252"},{"key":"31_CR22","doi-asserted-by":"publisher","first-page":"70","DOI":"10.1016\/j.ins.2017.05.041","volume":"415\u2013416","author":"K Rzecki","year":"2017","unstructured":"Rzecki, K., P\u0142awiak, P., Nied\u017awiecki, M., So\u015bnicki, T., Le\u015bkow, J., Ciesielski, M.: Person recognition based on touch screen gestures using computational intelligence methods. Inf. Sci. 415\u2013416, 70\u201384 (2017)","journal-title":"Inf. Sci."},{"key":"31_CR23","doi-asserted-by":"publisher","first-page":"53","DOI":"10.1016\/j.patrec.2017.02.010","volume":"89","author":"A Alsultan","year":"2017","unstructured":"Alsultan, A., Warwick, K., Wei, H.: Non-conventional keystroke dynamics for user authentication. Pattern Recogn. Lett. 89, 53\u201359 (2017)","journal-title":"Pattern Recogn. Lett."}],"container-title":["Lecture Notes in Computer Science","Bioinformatics and Biomedical Engineering"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-45385-5_31","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,5,27]],"date-time":"2020-05-27T12:16:12Z","timestamp":1590581772000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-030-45385-5_31"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020]]},"ISBN":["9783030453848","9783030453855"],"references-count":23,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-45385-5_31","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2020]]},"assertion":[{"value":"30 April 2020","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"IWBBIO","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Work-Conference on Bioinformatics and Biomedical Engineering","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Granada","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Spain","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2020","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"6 May 2020","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"8 May 2020","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"8","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"iwbbio2020","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/iwbbio.ugr.es\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}