{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T12:47:47Z","timestamp":1750337267444,"version":"3.40.3"},"publisher-location":"Cham","reference-count":21,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783031067907"},{"type":"electronic","value":"9783031067914"}],"license":[{"start":{"date-parts":[[2022,1,1]],"date-time":"2022-01-01T00:00:00Z","timestamp":1640995200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2022,1,1]],"date-time":"2022-01-01T00:00:00Z","timestamp":1640995200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2022]]},"DOI":"10.1007\/978-3-031-06791-4_49","type":"book-chapter","created":{"date-parts":[[2022,7,3]],"date-time":"2022-07-03T23:03:27Z","timestamp":1656889407000},"page":"625-638","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["Multi-device Continuous Authentication Mechanism Based on Homomorphic Encryption and SVM Algorithm"],"prefix":"10.1007","author":[{"given":"Wei","family":"Gan","sequence":"first","affiliation":[]},{"given":"Xuqiu","family":"Chen","sequence":"additional","affiliation":[]},{"given":"Wei","family":"Wang","sequence":"additional","affiliation":[]},{"given":"Lu","family":"Chen","sequence":"additional","affiliation":[]},{"given":"Jiaxi","family":"Wu","sequence":"additional","affiliation":[]},{"given":"Xian","family":"Wang","sequence":"additional","affiliation":[]},{"given":"Xin","family":"He","sequence":"additional","affiliation":[]},{"given":"Fan","family":"Wu","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2022,7,4]]},"reference":[{"key":"#cr-split#-49_CR1.1","doi-asserted-by":"crossref","unstructured":"Gomi, H., Yamaguchi, S., Tsubouchi, K., Sasaya, N.: Continuous authentication system us- ing online activities. In: 2018 17th IEEE International Conference on Trust, Security and Privacy","DOI":"10.1109\/TrustCom\/BigDataSE.2018.00080"},{"key":"#cr-split#-49_CR1.2","unstructured":"in Computing and Communications\/12th IEEE International Conference on Big Data Science And Engineering (TrustCom\/BigDataSE), pp. 522-532 (2018)"},{"issue":"4","key":"49_CR2","doi-asserted-by":"publisher","first-page":"49","DOI":"10.1109\/MSP.2016.2555335","volume":"33","author":"VM Patel","year":"2016","unstructured":"Patel, V.M., Chellappa, R., Chandra, D., Barbello, B.: Continuous user authentication on mobile devices: Recent progress and remaining challenges. IEEE Signal Process. Mag. 33(4), 49\u201361 (2016)","journal-title":"IEEE Signal Process. Mag."},{"key":"49_CR3","doi-asserted-by":"crossref","unstructured":"Song, X., Zhao, P., Wang, M., Yan, C.: A continuous identity verification method based on free-text keystroke dynamics. In: 2016 IEEE International Conference on Systems, Man, and Cybernetics (SMC), Budapest, Hungary, pp. 000206\u2013000210 (2016)","DOI":"10.1109\/SMC.2016.7844242"},{"key":"49_CR4","doi-asserted-by":"crossref","unstructured":"Messerman, A., Mustafic\u00b4, T., Camtepe, S.A., Albayrak, S.: Continuous and non-intrusive identity verification in real-time environments based on free-text keystroke dynamics. In: 2011 International Joint Conference on Biometrics (IJCB), Washington, DC, USA, pp. 1\u20138 (2011)","DOI":"10.1109\/IJCB.2011.6117552"},{"key":"49_CR5","doi-asserted-by":"publisher","first-page":"189","DOI":"10.1016\/j.patrec.2021.04.013","volume":"147","author":"L Hern\u00e1ndez-\u00c1lvarez","year":"2021","unstructured":"Hern\u00e1ndez-\u00c1lvarez, L., Fuentes, J.M.D., Gonz\u00e1lez-Manzano, L., Encinas, L.H.: SmartCAMPP-Smartphone-based continuous authentication leveraging motion sensors with privacy preservation. Pattern Recogn. Lett. 147, 189\u2013196 (2021)","journal-title":"Pattern Recogn. Lett."},{"key":"49_CR6","doi-asserted-by":"publisher","first-page":"102168","DOI":"10.1016\/j.cose.2020.102168","volume":"103","author":"PMS S\u00e1nchez","year":"2021","unstructured":"S\u00e1nchez, P.M.S., Maim\u00f3, L.F., Celdr\u00e1n, A.H., P\u00e9rez, G.M.: AuthCODE: A privacy- preserving and multi-device continuous authentication architecture based on machine and deep learning. Comput. Secur. 103, 102168 (2021)","journal-title":"Comput. Secur."},{"issue":"6","key":"49_CR7","doi-asserted-by":"publisher","first-page":"5008","DOI":"10.1109\/JIOT.2020.2975779","volume":"7","author":"M Abuhamad","year":"2020","unstructured":"Abuhamad, M., Abuhmed, T., Mohaisen, D., Nyang, D.: AUToSen: Deep-learning-based implicit continuous authentication using smartphone sensors. IEEE Internet Things J. 7(6), 5008\u20135020 (2020)","journal-title":"IEEE Internet Things J."},{"issue":"2","key":"49_CR8","doi-asserted-by":"publisher","first-page":"181","DOI":"10.1007\/s10207-018-0406-4","volume":"18","author":"K Kluczniak","year":"2018","unstructured":"Kluczniak, K., Wang, J., Chen, X., Kuty\u0142owski, M.: Multi-device anonymous authentication. Int. J. Inf. Secur. 18(2), 181\u2013197 (2018). https:\/\/doi.org\/10.1007\/s10207-018-0406-4","journal-title":"Int. J. Inf. Secur."},{"issue":"4","key":"49_CR9","doi-asserted-by":"publisher","first-page":"625","DOI":"10.1007\/s41870-019-00306-w","volume":"11","author":"S Samet","year":"2019","unstructured":"Samet, S., Ishraque, M.T., Ghadamyari, M., Kakadiya, K., Mistry, Y., Nakkabi, Y.: TouchMetric: a machine learning based continuous authentication feature testing mobile application. Int. J. Inf. Technol. 11(4), 625\u2013631 (2019). https:\/\/doi.org\/10.1007\/s41870-019-00306-w","journal-title":"Int. J. Inf. Technol."},{"key":"49_CR10","doi-asserted-by":"publisher","first-page":"109","DOI":"10.1016\/j.comcom.2020.09.006","volume":"163","author":"FH Al-Naji","year":"2020","unstructured":"Al-Naji, F.H., Zagrouba, R.: A survey on continuous authentication methods in Internet of Things environment. Comput. Commun. 163, 109\u2013133 (2020)","journal-title":"Comput. Commun."},{"key":"49_CR11","doi-asserted-by":"crossref","unstructured":"Udandarao, V., Agrawal, M., Kumar, R., Shah, R.R.: On the Inference of Soft Biometrics from Typing Patterns Collected in a Multi-device Environment. In: IEEE Sixth International Conference on Multimedia Big Data (BigMM), New Delhi, India, pp. 76\u201385 (2020)","DOI":"10.1109\/BigMM50055.2020.00021"},{"key":"49_CR12","doi-asserted-by":"crossref","unstructured":"Gomi, H., Yamaguchi, S., Ogami, W., Teraoka, T., Higurashi, T.: Context-Aware Authentica- tion Using Co-Located Devices. In: 18th IEEE International Conference on Trust, Security and Privacy; In: Computing And Communications\/13th IEEE International Conference On Big Data Science And Engineering, Rotorua, New Zealand, pp. 304\u2013311 (2019)","DOI":"10.1109\/TrustCom\/BigDataSE.2019.00048"},{"key":"49_CR13","doi-asserted-by":"crossref","unstructured":"Naehrig, M., Lauter, K., Vaikuntanathan, V.: Can homomorphic encryption be practical? In: Proceedings CCSW, pp. 113\u2013124 (2011)","DOI":"10.1145\/2046660.2046682"},{"issue":"3","key":"49_CR14","doi-asserted-by":"publisher","first-page":"270","DOI":"10.1109\/TDSC.2013.2297709","volume":"12","author":"A Ceccarelli","year":"2014","unstructured":"Ceccarelli, A., Montecchi, L., Brancati, F., Lollini, P., Marguglio, A.: Continuous and trans- parent user identity verification for secure internet services. IEEE Transactions on Depend- able and Secure Computing 12(3), 270\u2013283 (2014)","journal-title":"IEEE Transactions on Depend- able and Secure Computing"},{"issue":"6","key":"49_CR15","doi-asserted-by":"publisher","first-page":"859","DOI":"10.1016\/S0020-7373(05)80165-8","volume":"35","author":"J Leggett","year":"1991","unstructured":"Leggett, J., Williams, G., Usnick, M., Longnecker, M.: Dynamic identity verification via keystroke characteristics. Int. J. Man Mach. Stud. 35(6), 859\u2013870 (1991)","journal-title":"Int. J. Man Mach. Stud."},{"issue":"3","key":"49_CR16","doi-asserted-by":"publisher","first-page":"1357","DOI":"10.32604\/iasc.2022.022958","volume":"32","author":"AA Khan","year":"2022","unstructured":"Khan, A.A., Khan, F.A.: A cost-efficient radiation monitoring system for nuclear sites: de- signing and implementation. Intelligent Automation & Soft Computing 32(3), 1357\u20131367 (2022)","journal-title":"Intelligent Automation & Soft Computing"},{"key":"49_CR17","doi-asserted-by":"crossref","unstructured":"Shao, X.: Accurate multi-site daily-ahead multi-step pm2.5 concentrations forecasting using space-shared cnn-lstm. Computers, Materials & Continua 70(3), 5143\u20135160 (2022)","DOI":"10.32604\/cmc.2022.020689"},{"issue":"1","key":"49_CR18","doi-asserted-by":"publisher","first-page":"229","DOI":"10.32604\/csse.2022.020947","volume":"42","author":"R Malavika","year":"2022","unstructured":"Malavika, R., Valarmathi, M.L.: Adaptive server load balancing in sdn using pid neural net- work controller. Comput. Syst. Sci. Eng. 42(1), 229\u2013243 (2022)","journal-title":"Comput. Syst. Sci. Eng."},{"issue":"2","key":"49_CR19","doi-asserted-by":"publisher","first-page":"717","DOI":"10.32604\/csse.2022.021279","volume":"41","author":"H Alrajhi","year":"2022","unstructured":"Alrajhi, H.: A generalized state space average model for parallel dc-to-dc converters. Com- puter Systems Science and Engineering 41(2), 717\u2013734 (2022)","journal-title":"Com- puter Systems Science and Engineering"},{"issue":"4","key":"49_CR20","doi-asserted-by":"publisher","first-page":"197","DOI":"10.32604\/jcs.2020.014310","volume":"2","author":"X Ju","year":"2020","unstructured":"Ju, X.: An Overview of Face Manipulation Detection. Journal of Cyber Security 2(4), 197\u2013207 (2020)","journal-title":"Journal of Cyber Security"}],"container-title":["Lecture Notes in Computer Science","Artificial Intelligence and Security"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-031-06791-4_49","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,9,28]],"date-time":"2024-09-28T10:45:16Z","timestamp":1727520316000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-031-06791-4_49"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022]]},"ISBN":["9783031067907","9783031067914"],"references-count":21,"URL":"https:\/\/doi.org\/10.1007\/978-3-031-06791-4_49","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2022]]},"assertion":[{"value":"4 July 2022","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"ICAIS","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Artificial Intelligence and Security","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Qinghai","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"China","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2022","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"15 July 2022","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"20 July 2022","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"8","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"incodldos2022","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/www.icaisconf.com\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Single-blind","order":1,"name":"type","label":"Type","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"CMT","order":2,"name":"conference_management_system","label":"Conference Management System","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"1124","order":3,"name":"number_of_submissions_sent_for_review","label":"Number of Submissions Sent for Review","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"115","order":4,"name":"number_of_full_papers_accepted","label":"Number of Full Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"53","order":5,"name":"number_of_short_papers_accepted","label":"Number of Short Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"10% - The value is computed by the equation \"Number of Full Papers Accepted \/ Number of Submissions Sent for Review * 100\" and then rounded to a whole number.","order":6,"name":"acceptance_rate_of_full_papers","label":"Acceptance Rate of Full Papers","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"3","order":7,"name":"average_number_of_reviews_per_paper","label":"Average Number of Reviews per Paper","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"8","order":8,"name":"average_number_of_papers_per_reviewer","label":"Average Number of Papers per Reviewer","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"Yes","order":9,"name":"external_reviewers_involved","label":"External Reviewers Involved","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}}]}}