{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,30]],"date-time":"2025-10-30T07:16:20Z","timestamp":1761808580664,"version":"3.40.3"},"publisher-location":"Cham","reference-count":33,"publisher":"Springer Nature Switzerland","isbn-type":[{"type":"print","value":"9783031254666"},{"type":"electronic","value":"9783031254673"}],"license":[{"start":{"date-parts":[[2023,1,1]],"date-time":"2023-01-01T00:00:00Z","timestamp":1672531200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2023,1,1]],"date-time":"2023-01-01T00:00:00Z","timestamp":1672531200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2023]]},"DOI":"10.1007\/978-3-031-25467-3_2","type":"book-chapter","created":{"date-parts":[[2023,1,30]],"date-time":"2023-01-30T06:05:12Z","timestamp":1675058712000},"page":"15-30","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":2,"title":["ClapAuth: A Gesture-Based User-Friendly Authentication Scheme to\u00a0Access a\u00a0Secure Infrastructure"],"prefix":"10.1007","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-2723-2410","authenticated-orcid":false,"given":"Attaullah","family":"Buriro","sequence":"first","affiliation":[]},{"given":"Francesco","family":"Ricci","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2023,1,31]]},"reference":[{"issue":"1","key":"2_CR1","doi-asserted-by":"publisher","first-page":"145","DOI":"10.1109\/TSMC.2018.2814539","volume":"49","author":"J Tav\u010dar","year":"2018","unstructured":"Tav\u010dar, J., Horvath, I.: A review of the principles of designing smart cyber-physical systems for run-time adaptation: learned lessons and open issues. IEEE Trans. Syst. Man Cybern. 49(1), 145\u2013158 (2018)","journal-title":"IEEE Trans. Syst. Man Cybern."},{"doi-asserted-by":"crossref","unstructured":"Kra\u0161ovec, A., Pellarini, D., Geneiatakis, D., Baldini, G., Pejovi\u0107, V.: Not quite yourself today: behaviour-based continuous authentication in IoT environments. Proc. ACM Interact. Mob. Wearable Ubiquit. Technol. 4(4), 1\u201329 (2020)","key":"2_CR2","DOI":"10.1145\/3432206"},{"unstructured":"Smart door locks. http:\/\/www.yalelock.it\/en\/yale\/yale-italy\/smart-living\/smart-door-locks\/. Accessed 22 Apr 2022","key":"2_CR3"},{"doi-asserted-by":"crossref","unstructured":"Ho, G., Leung, D., Mishra, P., Hosseini, A., Song, D., Wagner, D.: Smart locks: lessons for securing commodity internet of things devices. In: Proceedings of the 11th ACM on Asia Conference on Computer and Communications Security, pp. 461\u2013472. ACM (2016)","key":"2_CR4","DOI":"10.1145\/2897845.2897886"},{"doi-asserted-by":"crossref","unstructured":"Katsini, C., Belk, M., Fidas, C., Avouris, N., Samaras, G.: Security and usability in knowledge-based user authentication: a review. In: Proceedings of the 20th Pan-Hellenic Conference on Informatics, pp. 1\u20136 (2016)","key":"2_CR5","DOI":"10.1145\/3003733.3003764"},{"issue":"2","key":"2_CR6","doi-asserted-by":"publisher","first-page":"82","DOI":"10.1109\/MNET.2019.1800240","volume":"33","author":"A Ometov","year":"2019","unstructured":"Ometov, A., Petrov, V., Bezzateev, S., Andreev, S., Koucheryavy, Y., Gerla, M.: Challenges of multi-factor authentication for securing advanced IoT applications. IEEE Netw. 33(2), 82\u201388 (2019)","journal-title":"IEEE Netw."},{"unstructured":"Yobico: 2020 state of password and authentication security behaviors report. https:\/\/pages.yubico.com\/2020-password-and-authentication-report. Accessed 22 Apr 2022","key":"2_CR7"},{"doi-asserted-by":"crossref","unstructured":"Buriro, A.: Behavioral biometrics for smartphone user authentication. University of Trento, Italy (2017)","key":"2_CR8","DOI":"10.1109\/SPW.2016.20"},{"unstructured":"Li, L., Zhao, X., Xue, G.: Unobservable re-authentication for smartphones. In: NDSS, vol. 56, pp. 57\u201359 (2013)","key":"2_CR9"},{"doi-asserted-by":"crossref","unstructured":"Zhang, H., Patel, V.M., Fathy, M., Chellappa, R.: Touch gesture-based active user authentication using dictionaries. In: 2015 IEEE Winter Conference on Applications of Computer Vision, pp. 207\u2013214. IEEE (2015)","key":"2_CR10","DOI":"10.1109\/WACV.2015.35"},{"key":"2_CR11","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"27","DOI":"10.1007\/978-3-319-23222-5_4","volume-title":"New Trends in Image Analysis and Processing \u2013 ICIAP 2015 Workshops","author":"A Buriro","year":"2015","unstructured":"Buriro, A., Crispo, B., Del Frari, F., Wrona, K.: Touchstroke: smartphone user authentication based on touch-typing biometrics. In: Murino, V., Puppo, E., Sona, D., Cristani, M., Sansone, C. (eds.) ICIAP 2015. LNCS, vol. 9281, pp. 27\u201334. Springer, Cham (2015). https:\/\/doi.org\/10.1007\/978-3-319-23222-5_4"},{"key":"2_CR12","doi-asserted-by":"publisher","first-page":"989","DOI":"10.1007\/s11265-021-01654-2","volume":"93","author":"A Buriro","year":"2021","unstructured":"Buriro, A., Gupta, S., Yautsiukhin, A., Crispo, B.: Risk-driven behavioral biometric-based one-shot-cum-continuous user authentication scheme. J. Signal Process. Syst. 93, 989\u20131006 (2021)","journal-title":"J. Signal Process. Syst."},{"doi-asserted-by":"crossref","unstructured":"Primo, A., Phoha, V.V., Kumar, R., Serwadda, A.: Context-aware active authentication using smartphone accelerometer measurements. In: Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition Workshops, pp. 98\u2013105. Springer, Heidelberg (2014)","key":"2_CR13","DOI":"10.1109\/CVPRW.2014.20"},{"unstructured":"Kumar, R., Phoha, V.V., Raina, R.: Authenticating users through their arm movement patterns, arXiv preprint arXiv:1603.02211 (2016)","key":"2_CR14"},{"key":"2_CR15","doi-asserted-by":"publisher","first-page":"174","DOI":"10.1016\/j.cose.2018.07.001","volume":"78","author":"T Nguyen","year":"2018","unstructured":"Nguyen, T., Memon, N.: Tap-based user authentication for smartwatches. Comput. Secur. 78, 174\u2013186 (2018)","journal-title":"Comput. Secur."},{"key":"2_CR16","doi-asserted-by":"publisher","first-page":"115","DOI":"10.1016\/j.cose.2017.01.008","volume":"66","author":"T Nguyen","year":"2017","unstructured":"Nguyen, T., Sae-Bae, N., Memon, N.: DRAW-A-PIN: authentication using finger-drawn PIN on touch devices. Comput. Secur. 66, 115\u2013128 (2017)","journal-title":"Comput. Secur."},{"doi-asserted-by":"crossref","unstructured":"Shang, J., Wu, J.: A usable authentication system using wrist-worn photoplethysmography sensors on smartwatches. In: 2019 IEEE Conference on Communications and Network Security (CNS), pp. 1\u20139. IEEE (2019)","key":"2_CR17","DOI":"10.1109\/CNS.2019.8802738"},{"doi-asserted-by":"crossref","unstructured":"Lewis, A., Li, Y., Xie, M.: Real time motion-based authentication for smartwatch. In: 2016 IEEE Conference on Communications and Network Security (CNS), pp. 380\u2013381. IEEE (2016)","key":"2_CR18","DOI":"10.1109\/CNS.2016.7860521"},{"doi-asserted-by":"crossref","unstructured":"Lu, C.X., Du, B., Kan, X., Wen, H., Markham, A., Trigoni, N.: VeriNet: user verification on smartwatches via behavior biometrics. In: Proceedings of the 1st ACM Workshop on Mobile Crowdsensing Systems and Applications, pp. 68\u201373 (2017)","key":"2_CR19","DOI":"10.1145\/3139243.3139251"},{"key":"2_CR20","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"30","DOI":"10.1007\/978-3-030-04372-8_3","volume-title":"Emerging Technologies for Authorization and Authentication","author":"A Buriro","year":"2018","unstructured":"Buriro, A., Crispo, B., Eskandri, M., Gupta, S., Mahboob, A., Van Acker, R.: SnapAuth: a gesture-based unobtrusive smartwatch user authentication scheme. In: Saracino, A., Mori, P. (eds.) ETAA 2018. LNCS, vol. 11263, pp. 30\u201337. Springer, Cham (2018). https:\/\/doi.org\/10.1007\/978-3-030-04372-8_3"},{"doi-asserted-by":"crossref","unstructured":"Buriro, A., Van Acker, R., Crispo, B., Mahboob, A.: Airsign: a gesture-based smartwatch user authentication. In: Proceedings of the 2018 International Carnahan Conference on Security Technology (ICCST), pp. 1\u20135. IEEE (2018)","key":"2_CR21","DOI":"10.1109\/CCST.2018.8585571"},{"doi-asserted-by":"crossref","unstructured":"Liang, G.-C., Xu, X.-Y., Yu, J.-D.: User-authentication on wearable devices based on punch gesture biometrics. In: ITM Web of Conferences, vol. 11, p. 01003. EDP Sciences (2017)","key":"2_CR22","DOI":"10.1051\/itmconf\/20171101003"},{"doi-asserted-by":"crossref","unstructured":"Yu, X., Zhou, Z., Xu, M., You, X., Li, X.-Y.: Thumbup: identification and authentication by smartwatch using simple hand gestures. In: 2020 IEEE International Conference on Pervasive Computing and Communications (PerCom), pp. 1\u201310. IEEE Computer Society (2020)","key":"2_CR23","DOI":"10.1109\/PerCom45495.2020.9127367"},{"doi-asserted-by":"crossref","unstructured":"Huang, C., Yang, Z., Chen, H., Zhang, Q.: Signing in the air W\/O constraints: robust gesture-based authentication for wrist wearables. In: IEEE Global Communications Conference (Globecom-2017), pp. 1\u20136. IEEE (2017)","key":"2_CR24","DOI":"10.1109\/GLOCOM.2017.8253995"},{"doi-asserted-by":"crossref","unstructured":"Baidya, J., Saha, T., Moyashir, R., Palit, R.: Design and implementation of a fingerprint based lock system for shared access. In: 2017 IEEE 7th Annual Computing and Communication Workshop and Conference (CCWC), pp. 1\u20136. IEEE (2017)","key":"2_CR25","DOI":"10.1109\/CCWC.2017.7868448"},{"doi-asserted-by":"crossref","unstructured":"Shi, W., Li, J., Ding, Y., Zhou, K.: Research on intelligent access control system based on interactive face liveness detection and machine vision. In: IOP Conference Series: Materials Science and Engineering, vol. 563, no. 5, p. 052094. IOP Publishing (2019)","key":"2_CR26","DOI":"10.1088\/1757-899X\/563\/5\/052094"},{"doi-asserted-by":"crossref","unstructured":"Yu, L., Li, K., Zheng, J.: Application design of the iris recognition technology in the access control management system. In: IOP Conference Series: Materials Science and Engineering, vol. 719, no. 1, p. 012040. IOP Publishing (2020)","key":"2_CR27","DOI":"10.1088\/1757-899X\/719\/1\/012040"},{"doi-asserted-by":"crossref","unstructured":"Gupta, S., Buriro, A., Crispo, B.: Smarthandle: a novel behavioral biometric-based authentication scheme for smart lock systems. In: Proceedings of the 2019 3rd International Conference on Biometric Engineering and Applications, pp. 15\u201322. ACM (2020)","key":"2_CR28","DOI":"10.1145\/3345336.3345344"},{"doi-asserted-by":"crossref","unstructured":"Weiss, G.M.: Wisdm smartphone and smartwatch activity and biometrics dataset. In: UCI Machine Learning Repository: WISDM Smartphone and Smartwatch Activity and Biometrics Dataset Data Set, vol. 7, pp. 133190\u2013133202 (2019)","key":"2_CR29","DOI":"10.1109\/ACCESS.2019.2940729"},{"key":"2_CR30","doi-asserted-by":"publisher","DOI":"10.1007\/978-0-387-71041-9","volume-title":"Handbook of Biometrics","author":"AK Jain","year":"2007","unstructured":"Jain, A.K., Flynn, P., Ross, A.A.: Handbook of Biometrics. Springer, New York (2007). https:\/\/doi.org\/10.1007\/978-0-387-71041-9"},{"issue":"1","key":"2_CR31","doi-asserted-by":"publisher","first-page":"10","DOI":"10.1145\/1656274.1656278","volume":"11","author":"M Hall","year":"2009","unstructured":"Hall, M., Frank, E., Holmes, G., Pfahringer, B., Reutemann, P., Witten, I.H.: The WEKA data mining software: an update. ACM SIGKDD Explor. Newslett. 11(1), 10\u201318 (2009)","journal-title":"ACM SIGKDD Explor. Newslett."},{"unstructured":"Hall, M.: Correlation-based feature subset selection for machine learning. University of Waikato, New Zealand (1998)","key":"2_CR32"},{"key":"2_CR33","doi-asserted-by":"publisher","first-page":"12256","DOI":"10.1109\/ACCESS.2021.3050704","volume":"9","author":"SA Raurale","year":"2021","unstructured":"Raurale, S.A., McAllister, J., Del Rinc\u00f3n, J.M.: EMG biometric systems based on different wrist-hand movements. IEEE Access 9, 12256\u201312266 (2021)","journal-title":"IEEE Access"}],"container-title":["Lecture Notes in Computer Science","Emerging Technologies for Authorization and Authentication"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-031-25467-3_2","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,1,30]],"date-time":"2023-01-30T06:07:15Z","timestamp":1675058835000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-031-25467-3_2"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023]]},"ISBN":["9783031254666","9783031254673"],"references-count":33,"URL":"https:\/\/doi.org\/10.1007\/978-3-031-25467-3_2","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2023]]},"assertion":[{"value":"31 January 2023","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"ETAA","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Workshop on Emerging Technologies for Authorization and Authentication","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Copenhagen","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Denmark","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2022","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"30 September 2022","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"30 September 2022","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"5","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"etaa2022","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/hosting.services.iit.cnr.it\/etaa2022\/index.html","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Single-blind","order":1,"name":"type","label":"Type","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"Easychair","order":2,"name":"conference_management_system","label":"Conference Management System","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"10","order":3,"name":"number_of_submissions_sent_for_review","label":"Number of Submissions Sent for Review","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"8","order":4,"name":"number_of_full_papers_accepted","label":"Number of Full Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"0","order":5,"name":"number_of_short_papers_accepted","label":"Number of Short Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"80% - The value is computed by the equation \"Number of Full Papers Accepted \/ Number of Submissions Sent for Review * 100\" and then rounded to a whole number.","order":6,"name":"acceptance_rate_of_full_papers","label":"Acceptance Rate of Full Papers","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"3","order":7,"name":"average_number_of_reviews_per_paper","label":"Average Number of Reviews per Paper","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"2","order":8,"name":"average_number_of_papers_per_reviewer","label":"Average Number of Papers per Reviewer","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"No","order":9,"name":"external_reviewers_involved","label":"External Reviewers Involved","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}}]}}