{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,20]],"date-time":"2025-06-20T04:08:09Z","timestamp":1750392489049,"version":"3.41.0"},"publisher-location":"Cham","reference-count":104,"publisher":"Springer Nature Switzerland","isbn-type":[{"value":"9783031957666","type":"print"},{"value":"9783031957673","type":"electronic"}],"license":[{"start":{"date-parts":[[2025,1,1]],"date-time":"2025-01-01T00:00:00Z","timestamp":1735689600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2025,1,1]],"date-time":"2025-01-01T00:00:00Z","timestamp":1735689600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2025]]},"DOI":"10.1007\/978-3-031-95767-3_5","type":"book-chapter","created":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T12:25:24Z","timestamp":1750335924000},"page":"110-136","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["SoK: Continuous Authentication Beyond Error Rates: Reviewing General System Properties"],"prefix":"10.1007","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-8824-2500","authenticated-orcid":false,"given":"Florian","family":"Dehling","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0009-0009-4804-3230","authenticated-orcid":false,"given":"Sebastian","family":"Kawelke","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-7863-0622","authenticated-orcid":false,"given":"Luigi","family":"Lo Iacono","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2025,6,20]]},"reference":[{"issue":"1","key":"5_CR1","doi-asserted-by":"publisher","first-page":"65","DOI":"10.1109\/JIOT.2020.3020076","volume":"8","author":"M Abuhamad","year":"2021","unstructured":"Abuhamad, M., Abusnaina, A., Nyang, D., Mohaisen, D.: Sensor-based continuous authentication of smartphones\u2019 users using behavioral biometrics: a contemporary survey. IEEE Internet Things J. 8(1), 65\u201384 (2021). https:\/\/doi.org\/10.1109\/JIOT.2020.3020076","journal-title":"IEEE Internet Things J."},{"issue":"6","key":"5_CR2","doi-asserted-by":"publisher","first-page":"2140","DOI":"10.1109\/TMC.2020.2974941","volume":"20","author":"A Acar","year":"2021","unstructured":"Acar, A., Aksu, H., Uluagac, A.S., Akkaya, K.: A usable and robust continuous authentication framework using wearables. IEEE Trans. Mob. Comput. 20(6), 2140\u20132153 (2021). https:\/\/doi.org\/10.1109\/TMC.2020.2974941","journal-title":"IEEE Trans. Mob. Comput."},{"key":"5_CR3","doi-asserted-by":"publisher","unstructured":"Acar, A., Aksu, H., Uluagac, A.S., Conti, M.: A survey on homomorphic encryption schemes: theory and implementation. ACM Comput. Surv. 51(4), 79:1\u201379:35 (2018). https:\/\/doi.org\/10.1145\/3214303","DOI":"10.1145\/3214303"},{"key":"5_CR4","doi-asserted-by":"publisher","unstructured":"Acar, A., et al.: A lightweight privacy-aware continuous authentication protocol-PACA. ACM Trans. Priv. Secur. 24(4), 24:1\u201324:28 (2021). https:\/\/doi.org\/10.1145\/3464690","DOI":"10.1145\/3464690"},{"issue":"1","key":"5_CR5","doi-asserted-by":"publisher","first-page":"455","DOI":"10.1007\/s10586-015-0510-4","volume":"19","author":"A Al\u00a0Abdulwahid","year":"2015","unstructured":"Al\u00a0Abdulwahid, A., Clarke, N., Stengel, I., Furnell, S., Reich, C.: Continuous and transparent multimodal authentication: reviewing the state of the art. Clust. Comput. 19(1), 455\u2013474 (2015). https:\/\/doi.org\/10.1007\/s10586-015-0510-4","journal-title":"Clust. Comput."},{"key":"5_CR6","doi-asserted-by":"publisher","first-page":"109","DOI":"10.1016\/j.comcom.2020.09.006","volume":"163","author":"FH Al-Naji","year":"2020","unstructured":"Al-Naji, F.H., Zagrouba, R.: A survey on continuous authentication methods in Internet of Things environment. Comput. Commun. 163, 109\u2013133 (2020). https:\/\/doi.org\/10.1016\/j.comcom.2020.09.006","journal-title":"Comput. Commun."},{"issue":"12","key":"5_CR7","doi-asserted-by":"publisher","first-page":"2648","DOI":"10.1109\/TIFS.2016.2594132","volume":"11","author":"M Al-Rubaie","year":"2016","unstructured":"Al-Rubaie, M., Chang, J.M.: Reconstruction attacks against mobile-based continuous authentication systems in the cloud. IEEE Trans. Inf. Forensics Secur. 11(12), 2648\u20132663 (2016). https:\/\/doi.org\/10.1109\/TIFS.2016.2594132","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"key":"5_CR8","doi-asserted-by":"publisher","DOI":"10.1016\/j.pmcj.2024.101922","volume":"101","author":"MA Alawami","year":"2024","unstructured":"Alawami, M.A., Abuhmed, T., Abuhamad, M., Kim, H.: MotionID: towards practical behavioral biometrics-based implicit user authentication on smartphones. Pervasive Mob. Comput. 101, 101922 (2024). https:\/\/doi.org\/10.1016\/j.pmcj.2024.101922","journal-title":"Pervasive Mob. Comput."},{"issue":"1","key":"5_CR9","doi-asserted-by":"publisher","first-page":"7690","DOI":"10.1038\/s41598-022-11865-7","volume":"12","author":"H Alfalahi","year":"2022","unstructured":"Alfalahi, H., et al.: Diagnostic accuracy of keystroke dynamics as digital biomarkers for fine motor decline in neuropsychiatric disorders: a systematic review and meta-analysis. Sci. Rep. 12(1), 7690 (2022). https:\/\/doi.org\/10.1038\/s41598-022-11865-7","journal-title":"Sci. Rep."},{"key":"5_CR10","unstructured":"Alliance, F.: FIDO2: Web Authentication (WebAuthn) (2019). https:\/\/fidoalliance.org\/fido2-2\/fido2-web-authentication-webauthn\/"},{"issue":"1","key":"5_CR11","doi-asserted-by":"publisher","first-page":"82","DOI":"10.1109\/MSEC.2021.3127459","volume":"20","author":"F Alt","year":"2022","unstructured":"Alt, F., Schneegass, S.: Beyond passwords-challenges and opportunities of future authentication. IEEE Secur. Priv. 20(1), 82\u201386 (2022). https:\/\/doi.org\/10.1109\/MSEC.2021.3127459","journal-title":"IEEE Secur. Priv."},{"issue":"3","key":"5_CR12","doi-asserted-by":"publisher","first-page":"1998","DOI":"10.1109\/COMST.2016.2537748","volume":"18","author":"A Alzubaidi","year":"2016","unstructured":"Alzubaidi, A., Kalita, J.: Authentication of smartphone users using behavioral biometrics. IEEE Commun. Surv. Tutor. 18(3), 1998\u20132026 (2016). https:\/\/doi.org\/10.1109\/COMST.2016.2537748","journal-title":"IEEE Commun. Surv. Tutor."},{"key":"5_CR13","doi-asserted-by":"publisher","first-page":"82996","DOI":"10.1109\/ACCESS.2024.3411783","volume":"12","author":"S Ayeswarya","year":"2024","unstructured":"Ayeswarya, S., Singh, K.J.: A comprehensive review on secure biometric-based continuous authentication and user profiling. IEEE Access 12, 82996\u201383021 (2024). https:\/\/doi.org\/10.1109\/ACCESS.2024.3411783","journal-title":"IEEE Access"},{"issue":"17","key":"5_CR14","doi-asserted-by":"publisher","first-page":"5967","DOI":"10.3390\/s21175967","volume":"21","author":"AF Baig","year":"2021","unstructured":"Baig, A.F., Eskeland, S.: Security, privacy, and usability in continuous authentication: a survey. Sensors 21(17), 5967 (2021). https:\/\/doi.org\/10.3390\/s21175967","journal-title":"Sensors"},{"key":"5_CR15","series-title":"IFIP Advances in Information and Communication Technology","doi-asserted-by":"publisher","first-page":"235","DOI":"10.1007\/978-3-642-30436-1_20","volume-title":"Information Security and Privacy Research","author":"C Banse","year":"2012","unstructured":"Banse, C., Herrmann, D., Federrath, H.: Tracking users on the internet with behavioral patterns: evaluation of its practical feasibility. In: Gritzalis, D., Furnell, S., Theoharidou, M. (eds.) SEC 2012. IAICT, vol. 376, pp. 235\u2013248. Springer, Heidelberg (2012). https:\/\/doi.org\/10.1007\/978-3-642-30436-1_20"},{"key":"5_CR16","doi-asserted-by":"publisher","unstructured":"Barlas, Y., Basar, O.E., Akan, Y., Isbilen, M., Alptekin, G.I., Incel, O.D.: DAKOTA: continuous authentication with behavioral biometrics in a mobile banking application. In: 2020 5th International Conference on Computer Science and Engineering (UBMK), pp. 1\u20136 (2020). https:\/\/doi.org\/10.1109\/UBMK50275.2020.9219365","DOI":"10.1109\/UBMK50275.2020.9219365"},{"issue":"19","key":"5_CR17","first-page":"1","volume":"20","author":"M Bellare","year":"2010","unstructured":"Bellare, M., Rogaway, P., Spies, T.: The ffx mode of operation for format-preserving encryption. NIST Submission 20(19), 1\u201318 (2010)","journal-title":"NIST Submission"},{"key":"5_CR18","doi-asserted-by":"publisher","unstructured":"Bin Amanat\u00a0Ali, A., et al.: Smartphone security using swipe behavior-based authentication. Intell. Autom. Soft Comput. 29(2), 571\u2013585 (2021). https:\/\/doi.org\/10.32604\/iasc.2021.015913","DOI":"10.32604\/iasc.2021.015913"},{"issue":"9","key":"5_CR19","doi-asserted-by":"publisher","first-page":"989","DOI":"10.1007\/s11265-021-01654-2","volume":"93","author":"A Buriro","year":"2021","unstructured":"Buriro, A., Gupta, S., Yautsiukhin, A., Crispo, B.: Risk-driven behavioral biometric-based one-shot-cum-continuous user authentication scheme. J. Signal Process. Syst. 93(9), 989\u20131006 (2021). https:\/\/doi.org\/10.1007\/s11265-021-01654-2","journal-title":"J. Signal Process. Syst."},{"key":"5_CR20","unstructured":"Cai, L., Chen, H.: TouchLogger: inferring keystrokes on touch screen from smartphone motion. In: Proceedings of the 6th USENIX Conference on Hot Topics in Security, HotSec\u201911, p.\u00a09. USENIX Association (2011)"},{"key":"5_CR21","doi-asserted-by":"publisher","DOI":"10.1016\/j.mex.2022.101895","volume":"9","author":"A Carrera-Rivera","year":"2022","unstructured":"Carrera-Rivera, A., Ochoa, W., Larrinaga, F., Lasa, G.: How-to conduct a systematic literature review: a quick guide for computer science research. MethodsX 9, 101895 (2022). https:\/\/doi.org\/10.1016\/j.mex.2022.101895","journal-title":"MethodsX"},{"key":"5_CR22","doi-asserted-by":"publisher","unstructured":"Centeno, M.P., Moorsel, A.V., Castruccio, S.: Smartphone continuous authentication using deep learning autoencoders. In: 2017 15th Annual Conference on Privacy, Security and Trust (PST), pp. 147\u20131478. IEEE, Calgary (2017). https:\/\/doi.org\/10.1109\/PST.2017.00026","DOI":"10.1109\/PST.2017.00026"},{"key":"5_CR23","doi-asserted-by":"publisher","unstructured":"Chow, R., et al.: Authentication in the clouds: a framework and its application to mobile users. In: Proceedings of the 2010 ACM Workshop on Cloud Computing Security Workshop, CCSW \u201910, pp. 1\u20136. Association for Computing Machinery, New York (2010). https:\/\/doi.org\/10.1145\/1866835.1866837","DOI":"10.1145\/1866835.1866837"},{"key":"5_CR24","doi-asserted-by":"publisher","DOI":"10.1016\/j.pmcj.2021.101483","volume":"78","author":"G Cola","year":"2021","unstructured":"Cola, G., Vecchio, A., Avvenuti, M.: Continuous authentication through gait analysis on a wrist-worn device. Pervasive Mob. Comput. 78, 101483 (2021). https:\/\/doi.org\/10.1016\/j.pmcj.2021.101483","journal-title":"Pervasive Mob. Comput."},{"key":"5_CR25","doi-asserted-by":"publisher","unstructured":"Corrigan-Gibbs, H., Ford, B.: Dissent: accountable anonymous group messaging. In: Proceedings of the 17th ACM Conference on Computer and Communications Security, CCS \u201910, pp. 340\u2013350. Association for Computing Machinery, New York (2010). https:\/\/doi.org\/10.1145\/1866307.1866346","DOI":"10.1145\/1866307.1866346"},{"key":"5_CR26","doi-asserted-by":"publisher","unstructured":"Crawford, H., Renaud, K., Storer, T.: A framework for continuous, transparent mobile device authentication. Comput. Secur. 39(B), 127\u2013136 (2013). https:\/\/doi.org\/10.1016\/j.cose.2013.05.005","DOI":"10.1016\/j.cose.2013.05.005"},{"key":"5_CR27","doi-asserted-by":"publisher","unstructured":"Crouse, D., Han, H., Chandra, D., Barbello, B., Jain, A.K.: Continuous authentication of mobile user: fusion of face image and inertial Measurement Unit data. In: 2015 International Conference on Biometrics (ICB), pp. 135\u2013142 (2015). https:\/\/doi.org\/10.1109\/ICB.2015.7139043","DOI":"10.1109\/ICB.2015.7139043"},{"issue":"4","key":"5_CR28","doi-asserted-by":"publisher","DOI":"10.1002\/widm.1365","volume":"10","author":"G Dahia","year":"2020","unstructured":"Dahia, G., Jesus, L., Pamplona Segundo, M.: Continuous authentication using biometrics: an advanced review. Wiley Interdisc. Rev.-Data Min. Knowl. Disc. 10(4), e1365 (2020). https:\/\/doi.org\/10.1002\/widm.1365","journal-title":"Wiley Interdisc. Rev.-Data Min. Knowl. Disc."},{"key":"5_CR29","doi-asserted-by":"publisher","unstructured":"Dehling, F., Tolsdorf, J., Federrath, H., Lo\u00a0Iacono, L.: Internet users\u2019 willingness to disclose biometric data for continuous online account protection: an empirical investigation. Proc. Priv. Enhan. Technol. 2024(2), 479\u2013508 (2024). https:\/\/doi.org\/10.56553\/popets-2024-0060","DOI":"10.56553\/popets-2024-0060"},{"issue":"11","key":"5_CR30","doi-asserted-by":"publisher","first-page":"3765","DOI":"10.3390\/s21113765","volume":"21","author":"JM Esp\u00edn L\u00f3pez","year":"2021","unstructured":"Esp\u00edn L\u00f3pez, J.M., Huertas Celdr\u00e1n, A., Mar\u00edn-Bl\u00e1zquez, J.G., Esquembre, F., Mart\u00ednez P\u00e9rez, G.: S3: an AI-enabled user continuous authentication for smartphones based on sensors, statistics and speaker information. Sensors 21(11), 3765 (2021). https:\/\/doi.org\/10.3390\/s21113765","journal-title":"Sensors"},{"key":"5_CR31","unstructured":"European Union: General Data Protection Regulation (2016)"},{"key":"5_CR32","doi-asserted-by":"publisher","unstructured":"Feng, T., Yang, J., Yan, Z., Tapia, E.M., Shi, W.: TIPS: context-aware implicit user identification using touch screen in uncontrolled environments. In: Proceedings of the 15th Workshop on Mobile Computing Systems and Applications, pp. 1\u20136. ACM, Santa Barbara (2014). https:\/\/doi.org\/10.1145\/2565585.2565592","DOI":"10.1145\/2565585.2565592"},{"key":"5_CR33","doi-asserted-by":"publisher","unstructured":"Feng, T., Zhao, X., Carbunar, B., Shi, W.: Continuous mobile authentication using virtual key typing biometrics. In: 2013 12th IEEE International Conference on Trust, Security and Privacy in Computing and Communications, pp. 1547\u20131552 (2013). https:\/\/doi.org\/10.1109\/TrustCom.2013.272","DOI":"10.1109\/TrustCom.2013.272"},{"issue":"4","key":"5_CR34","doi-asserted-by":"publisher","first-page":"47","DOI":"10.1109\/MCC.2018.043221014","volume":"5","author":"G Fenu","year":"2018","unstructured":"Fenu, G., Marras, M.: Controlling user access to cloud-connected mobile applications by means of biometrics. IEEE Cloud Comput. 5(4), 47\u201357 (2018). https:\/\/doi.org\/10.1109\/MCC.2018.043221014","journal-title":"IEEE Cloud Comput."},{"key":"5_CR35","doi-asserted-by":"publisher","first-page":"83","DOI":"10.1016\/j.patrec.2017.03.027","volume":"113","author":"G Fenu","year":"2018","unstructured":"Fenu, G., Marras, M., Boratto, L.: A multi-biometric system for continuous student authentication in e-learning platforms. Pattern Recogn. Lett. 113, 83\u201392 (2018). https:\/\/doi.org\/10.1016\/j.patrec.2017.03.027","journal-title":"Pattern Recogn. Lett."},{"key":"5_CR36","doi-asserted-by":"publisher","unstructured":"Fereidooni, H., et al.: AuthentiSense: a scalable behavioral biometrics authentication scheme using few-shot learning for mobile platforms. In: Proceedings 2023 Network and Distributed System Security Symposium, Internet Society, San Diego (2023). https:\/\/doi.org\/10.14722\/ndss.2023.23194","DOI":"10.14722\/ndss.2023.23194"},{"key":"5_CR37","doi-asserted-by":"publisher","unstructured":"Gan, W., et al.: Multi-device continuous authentication mechanism based on homomorphic encryption and SVM algorithm. In: Sun, X., Zhang, X., Xia, Z., Bertino, E. (eds.) Artificial Intelligence and Security, pp. 625\u2013638, Lecture Notes in Computer Science, Springer, Cham (2022), https:\/\/doi.org\/10.1007\/978-3-031-06791-4_49","DOI":"10.1007\/978-3-031-06791-4_49"},{"key":"5_CR38","doi-asserted-by":"publisher","unstructured":"Georgiev, M., Eberz, S., Turner, H., Lovisotto, G., Martinovic, I.: Common evaluation pitfalls in touch-based authentication systems. In: Proceedings of the 2022 ACM on Asia Conference on Computer and Communications Security, ASIA CCS \u201922, pp. 1049\u20131063. Association for Computing Machinery, New York (2022). https:\/\/doi.org\/10.1145\/3488932.3517388","DOI":"10.1145\/3488932.3517388"},{"key":"5_CR39","doi-asserted-by":"publisher","unstructured":"Gonzalez-Manzano, L., Fuentes, J.M.D., Ribagorda, A.: Leveraging user-related internet of things for continuous authentication: a survey. ACM Comput. Surv. 52(3), 53:1\u201353:38 (2019). https:\/\/doi.org\/10.1145\/3314023","DOI":"10.1145\/3314023"},{"key":"5_CR40","doi-asserted-by":"publisher","first-page":"8","DOI":"10.1016\/j.patrec.2022.03.011","volume":"157","author":"S Gupta","year":"2022","unstructured":"Gupta, S., Kumar, R., Kacimi, M., Crispo, B.: IDeAuth: a novel behavioral biometric-based implicit deauthentication scheme for smartphones. Pattern Recogn. Lett. 157, 8\u201315 (2022). https:\/\/doi.org\/10.1016\/j.patrec.2022.03.011","journal-title":"Pattern Recogn. Lett."},{"key":"5_CR41","doi-asserted-by":"publisher","unstructured":"Hernandez-alvarez, L., Maria\u00a0de Fuentes, J., Gonzalez-Manzano, L., Hernandez\u00a0Encinas, L.: Privacy-preserving sensor-based continuous authentication and user profiling: a review. Sensors 21(1), 92 (2021). https:\/\/doi.org\/10.3390\/s21010092","DOI":"10.3390\/s21010092"},{"key":"5_CR42","doi-asserted-by":"publisher","first-page":"189","DOI":"10.1016\/j.patrec.2021.04.013","volume":"147","author":"L Hern\u00e1ndez-\u00c1lvarez","year":"2021","unstructured":"Hern\u00e1ndez-\u00c1lvarez, L., de Fuentes, J.M., Gonz\u00e1lez-Manzano, L., Hern\u00e1ndez Encinas, L.: SmartCAMPP - smartphone-based continuous authentication leveraging motion sensors with privacy preservation. Pattern Recogn. Lett. 147, 189\u2013196 (2021). https:\/\/doi.org\/10.1016\/j.patrec.2021.04.013","journal-title":"Pattern Recogn. Lett."},{"key":"5_CR43","doi-asserted-by":"publisher","unstructured":"Hintze, D., et al.: CORMORANT: ubiquitous risk-aware multi-modal biometric authentication across mobile devices. Proc. ACM Interact. Mob. Wearable Ubiq. Technol. 3(3), 85:1\u201385:23 (2019). https:\/\/doi.org\/10.1145\/3351243","DOI":"10.1145\/3351243"},{"key":"5_CR44","doi-asserted-by":"publisher","unstructured":"Huh, J.H., et al.: On the long-term effects of continuous keystroke authentication: keeping user frustration low through behavior adaptation. Proc. ECM Interact. Mob. Wearable Ubiq. Technol.-IMWUT 7(2) (2023). https:\/\/doi.org\/10.1145\/3596236","DOI":"10.1145\/3596236"},{"key":"5_CR45","unstructured":"Illinois State Legislature: Biometric Information Privacy Act (2008)"},{"key":"5_CR46","unstructured":"Ji, J., Li, J., Yan, S., Zhang, B., Tian, Q.: Super-bit locality-sensitive hashing. In: Advances in Neural Information Processing Systems, vol.\u00a025, Curran Associates, Inc. (2012)"},{"key":"5_CR47","doi-asserted-by":"publisher","unstructured":"Jorquera\u00a0Valero, J.M., et sl.: Improving the security and QoE in mobile devices through an intelligent and adaptive continuous authentication system. Sensors 18(11), 3769 (2018). https:\/\/doi.org\/10.3390\/s18113769","DOI":"10.3390\/s18113769"},{"key":"5_CR48","doi-asserted-by":"publisher","first-page":"70","DOI":"10.1016\/j.patrec.2016.05.016","volume":"80","author":"K Karabina","year":"2016","unstructured":"Karabina, K., Canpolat, O.: A new cryptographic primitive for noise tolerant template security. Pattern Recogn. Lett. 80, 70\u201375 (2016). https:\/\/doi.org\/10.1016\/j.patrec.2016.05.016","journal-title":"Pattern Recogn. Lett."},{"key":"5_CR49","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"307","DOI":"10.1007\/978-3-030-58802-1_23","volume-title":"Computational Science and Its Applications \u2013 ICCSA 2020","author":"K Ka\u0161ys","year":"2020","unstructured":"Ka\u0161ys, K., Dundulis, A., Vasiljevas, M., Maskeli\u016bnas, R., Dama\u0161evi\u010dius, R.: BodyLock: human identity recogniser app from walking activity data. In: Gervasi, O., et al. (eds.) ICCSA 2020. LNCS, vol. 12250, pp. 307\u2013319. Springer, Cham (2020). https:\/\/doi.org\/10.1007\/978-3-030-58802-1_23"},{"key":"5_CR50","doi-asserted-by":"publisher","unstructured":"Khan, H., Atwater, A., Hengartner, U.: Itus: an implicit authentication framework for android. In: Proceedings of the 20th Annual International Conference on Mobile Computing and Networking, MobiCom \u201914, pp. 507\u2013518. Association for Computing Machinery, New York (2014). https:\/\/doi.org\/10.1145\/2639108.2639141","DOI":"10.1145\/2639108.2639141"},{"key":"5_CR51","doi-asserted-by":"publisher","unstructured":"Khan, H., Hengartner, U., Vogel, D.: Mimicry attacks on smartphone keystroke authentication. ACM Trans. Priv. Secur. 23(1), 2:1\u20132:34 (2020). https:\/\/doi.org\/10.1145\/3372420","DOI":"10.1145\/3372420"},{"key":"5_CR52","doi-asserted-by":"publisher","first-page":"72398","DOI":"10.1109\/ACCESS.2021.3079375","volume":"9","author":"M Labayen","year":"2021","unstructured":"Labayen, M., Vea, R., Fl\u00f3rez, J., Aginako, N., Sierra, B.: Online student authentication and proctoring system based on multimodal biometrics technology. IEEE Access 9, 72398\u201372411 (2021). https:\/\/doi.org\/10.1109\/ACCESS.2021.3079375","journal-title":"IEEE Access"},{"key":"5_CR53","doi-asserted-by":"publisher","unstructured":"Lalithamani, N., Balaji, D.R., Dev, S.S.: Survey on nonobstructive and continuous user authentication on mobile devices. In: 2017 4th International Conference on Advanced Computing and Communication Systems (ICACCS), pp. 1\u20136 (2017). https:\/\/doi.org\/10.1109\/ICACCS.2017.8014709","DOI":"10.1109\/ICACCS.2017.8014709"},{"key":"5_CR54","doi-asserted-by":"publisher","unstructured":"Lee, W.H., Lee, R.B.: Implicit smartphone user authentication with sensors and contextual machine learning, pp. 297\u2013308. IEEE Computer Society (2017). https:\/\/doi.org\/10.1109\/DSN.2017.24","DOI":"10.1109\/DSN.2017.24"},{"key":"5_CR55","doi-asserted-by":"publisher","unstructured":"Lee, W.H., Lee, R.B.: Sensor-based implicit authentication of smartphone users. In: 2017 47th Annual IEEE\/IFIP International Conference on Dependable Systems and Networks (DSN), pp. 309\u2013320 (2017). https:\/\/doi.org\/10.1109\/DSN.2017.21","DOI":"10.1109\/DSN.2017.21"},{"key":"5_CR56","unstructured":"Li, L., Zhao, X., Xue, G.: Unobservable re-authentication for smartphones. In: Network and Distributed System Security Symposium (2013)"},{"key":"5_CR57","doi-asserted-by":"publisher","unstructured":"Li, Q., Chen, H.: CDAS: a continuous dynamic authentication system. In: Proceedings of the 2019 8th International Conference on Software and Computer Applications, ICSCA \u201919, pp. 447\u2013452. Association for Computing Machinery, New York (2019). https:\/\/doi.org\/10.1145\/3316615.3316691","DOI":"10.1145\/3316615.3316691"},{"key":"5_CR58","doi-asserted-by":"publisher","unstructured":"Li, Q., Wang, L., Kim, T., Im, E.G.: Mobile-based continuous user authentication system for cloud security. In: 2016 IEEE International Conference on Network Infrastructure and Digital Content (IC-NIDC), pp. 176\u2013179 (2016), https:\/\/doi.org\/10.1109\/ICNIDC.2016.7974559","DOI":"10.1109\/ICNIDC.2016.7974559"},{"key":"5_CR59","doi-asserted-by":"publisher","unstructured":"Li, Y., Huang, Y., Huang, H.: FuMeAuth: sensor-based continuous authentication using fused memory-augmented transformer autoencoder. IEEE Internet Things J. (2024). https:\/\/doi.org\/10.1109\/JIOT.2024.3394437","DOI":"10.1109\/JIOT.2024.3394437"},{"issue":"5","key":"5_CR60","doi-asserted-by":"publisher","first-page":"4467","DOI":"10.1109\/TMC.2023.3290834","volume":"23","author":"Y Li","year":"2024","unstructured":"Li, Y., Liu, L., Deng, S., Qin, H., El-Yacoubi, M.A., Zhou, G.: Memory-augmented autoencoder based continuous authentication on smartphones with conditional transformer GANs. IEEE Trans. Mob. Comput. 23(5), 4467\u20134482 (2024). https:\/\/doi.org\/10.1109\/TMC.2023.3290834","journal-title":"IEEE Trans. Mob. Comput."},{"issue":"16","key":"5_CR61","doi-asserted-by":"publisher","first-page":"27635","DOI":"10.1109\/JIOT.2024.3399549","volume":"11","author":"Y Li","year":"2024","unstructured":"Li, Y., Ouyang, C., Huang, H.: AEGANAuth: autoencoder GAN-based continuous authentication with conditional variational autoencoder generative adversarial network. IEEE Internet Things J. 11(16), 27635\u201327650 (2024). https:\/\/doi.org\/10.1109\/JIOT.2024.3399549","journal-title":"IEEE Internet Things J."},{"issue":"1","key":"5_CR62","doi-asserted-by":"publisher","first-page":"155014771989937","DOI":"10.1177\/1550147719899371","volume":"16","author":"X Liang","year":"2020","unstructured":"Liang, X., Zou, F., Li, L., Yi, P.: Mobile terminal identity authentication system based on behavioral characteristics. Int. J. Distrib. Sens. Netw. 16(1), 1550147719899371 (2020). https:\/\/doi.org\/10.1177\/1550147719899371","journal-title":"Int. J. Distrib. Sens. Netw."},{"key":"5_CR63","doi-asserted-by":"publisher","unstructured":"Lopes dos Santos, U.J., et al.: Trends in user identity and continuous authentication. Computer 55(11), 52\u201361 (2022). https:\/\/doi.org\/10.1109\/MC.2022.3187274","DOI":"10.1109\/MC.2022.3187274"},{"key":"5_CR64","doi-asserted-by":"publisher","DOI":"10.1016\/j.jisa.2023.103622","volume":"78","author":"J Lopez","year":"2023","unstructured":"Lopez, J., Celdran, A.H., Esquembre, F., Perez, G.M., Marin-Blazquez, J.G.: CGAPP: a continuous group authentication privacy-preserving platform for industrial scene. J. Inf. Secur. Appl. 78, 103622 (2023). https:\/\/doi.org\/10.1016\/j.jisa.2023.103622","journal-title":"J. Inf. Secur. Appl."},{"key":"5_CR65","doi-asserted-by":"publisher","unstructured":"L\u00f3pez, J.M.E., Celdr\u00e1n, A.H., Esquembre, F., P\u00e9rez, G.M., Mar\u00edn-Bl\u00e1zquez, J.G.: A supervised ML biometric continuous authentication system for Industry 4.0. IEEE Trans. Ind. Inf. 18(12), 9132\u20139140 (2022). https:\/\/doi.org\/10.1109\/TII.2022.3171321","DOI":"10.1109\/TII.2022.3171321"},{"key":"5_CR66","doi-asserted-by":"publisher","unstructured":"Mahfouz, A., Hamdy, A., Eldin, M.A., Mahmoud, T.M.: B2auth: a contextual fine-grained behavioral biometric authentication framework for real-world deployment. Pervasive Mob. Comput., 101888 (2024). https:\/\/doi.org\/10.1016\/j.pmcj.2024.101888","DOI":"10.1016\/j.pmcj.2024.101888"},{"key":"5_CR67","doi-asserted-by":"publisher","unstructured":"Mainali, P., Shepherd, C., Petitcolas, F.A.P.: Privacy-enhancing context authentication from location-sensitive data. In: Proceedings of the 14th International Conference on Availability, Reliability and Security, pp. 1\u201310. ACM, Canterbury (2019). https:\/\/doi.org\/10.1145\/3339252.3340334","DOI":"10.1145\/3339252.3340334"},{"key":"5_CR68","doi-asserted-by":"publisher","unstructured":"Maiti, A., Armbruster, O., Jadliwala, M., He, J.: Smartwatch-based keystroke inference attacks and context-aware protection mechanisms. In: Proceedings of the 11th ACM on Asia Conference on Computer and Communications Security, ASIA CCS \u201916, pp. 795\u2013806. Association for Computing Machinery, New York (2016). https:\/\/doi.org\/10.1145\/2897845.2897905","DOI":"10.1145\/2897845.2897905"},{"key":"5_CR69","doi-asserted-by":"publisher","unstructured":"Monschein, D., Peregrina\u00a0Perez, J.A., Piotrowski, T., Nochta, Z., Waldhorst, O.P., Zirpins, C.: Towards a peer-to-peer federated machine learning environment for continuous authentication. In: 2021 IEEE Symposium on Computers and Communications (ISCC), pp. 1\u20136. IEEE, Athens (2021). https:\/\/doi.org\/10.1109\/ISCC53001.2021.9631491","DOI":"10.1109\/ISCC53001.2021.9631491"},{"key":"5_CR70","doi-asserted-by":"publisher","unstructured":"Monschein, D., Waldhorst, O.P.: SPCAuth: scalable and privacy-preserving continuous authentication for web applications. In: 2021 IEEE 46th Conference on Local Computer Networks (LCN), pp. 281\u2013286. IEEE, Edmonton (2021). https:\/\/doi.org\/10.1109\/LCN52139.2021.9524959","DOI":"10.1109\/LCN52139.2021.9524959"},{"key":"5_CR71","doi-asserted-by":"publisher","unstructured":"Monschein, D., Waldhorst, O.P.: mPSAuth: privacy-preserving and scalable authentication for mobile web applications (2022). https:\/\/doi.org\/10.48550\/arXiv.2210.04777","DOI":"10.48550\/arXiv.2210.04777"},{"key":"5_CR72","doi-asserted-by":"publisher","unstructured":"Mostafa, H., El-Ramly, M., Elkorany, A.M., Shaban, H.: Behavio2Auth: sensor-based behavior biometric authentication for smartphones. In: Proceedings of the ArabWIC 6th Annual International Conference Research Track, ArabWIC 2019, pp. 1\u20136. Association for Computing Machinery, New York (2019). https:\/\/doi.org\/10.1145\/3333165.3333176","DOI":"10.1145\/3333165.3333176"},{"key":"5_CR73","doi-asserted-by":"publisher","unstructured":"Newhouse, W., Johnson, B., Kinling, S., Kuruvilla, J., Mulugeta, B., Sandlin, K.: Multifactor Authentication for E-Commerce: Risk-Based, FIDO Universal Second Factor Implementations for Purchasers. Tech. Rep. NIST Special Publication (SP) 1800-17, National Institute of Standards and Technology (2019). https:\/\/doi.org\/10.6028\/NIST.SP.1800-17","DOI":"10.6028\/NIST.SP.1800-17"},{"issue":"4","key":"5_CR74","doi-asserted-by":"publisher","first-page":"771","DOI":"10.1109\/TIFS.2010.2075927","volume":"5","author":"K Niinuma","year":"2010","unstructured":"Niinuma, K., Park, U., Jain, A.K.: Soft biometric traits for continuous user authentication. IEEE Trans. Inf. Forensics Secur. 5(4), 771\u2013780 (2010). https:\/\/doi.org\/10.1109\/TIFS.2010.2075927","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"key":"5_CR75","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"533","DOI":"10.1007\/978-3-030-21548-4_29","volume-title":"Information Security and Privacy","author":"X Pang","year":"2019","unstructured":"Pang, X., Yang, L., Liu, M., Ma, J.: MineAuth: mining behavioural habits for continuous authentication on a smartphone. In: Jang-Jaccard, J., Guo, F. (eds.) ACISP 2019. LNCS, vol. 11547, pp. 533\u2013551. Springer, Cham (2019). https:\/\/doi.org\/10.1007\/978-3-030-21548-4_29"},{"issue":"4","key":"5_CR76","first-page":"39","volume":"39","author":"A Rashid","year":"2023","unstructured":"Rashid, A., Schoenbauer, C., O\u2019Reilly, J., Handoko, M., Dave, R., Vanamala, M.: Clicking your way to security: a review of continuous authentication with mouse dynamics. J. Comput. Sci. Coll. 39(4), 39\u201349 (2023)","journal-title":"J. Comput. Sci. Coll."},{"issue":"2","key":"5_CR77","doi-asserted-by":"publisher","first-page":"1633","DOI":"10.1007\/s11042-022-13245-9","volume":"82","author":"PK Rayani","year":"2023","unstructured":"Rayani, P.K., Changder, S.: Continuous user authentication on smartphone via behavioral biometrics: a survey. Multimedia Tools Appl. 82(2), 1633\u20131667 (2023). https:\/\/doi.org\/10.1007\/s11042-022-13245-9","journal-title":"Multimedia Tools Appl."},{"key":"5_CR78","doi-asserted-by":"publisher","first-page":"697","DOI":"10.1016\/j.neucom.2020.02.122","volume":"423","author":"R Rocha","year":"2021","unstructured":"Rocha, R., Carneiro, D., Novais, P.: Continuous authentication with a focus on explainability. Neurocomputing 423, 697\u2013702 (2021). https:\/\/doi.org\/10.1016\/j.neucom.2020.02.122","journal-title":"Neurocomputing"},{"key":"5_CR79","doi-asserted-by":"publisher","first-page":"24561","DOI":"10.1109\/ACCESS.2023.3253484","volume":"11","author":"R Ryu","year":"2023","unstructured":"Ryu, R., Yeom, S., Herbert, D., Dermoudy, J.: A comprehensive survey of context-aware continuous implicit authentication in online learning environments. IEEE Access 11, 24561\u201324573 (2023). https:\/\/doi.org\/10.1109\/ACCESS.2023.3253484","journal-title":"IEEE Access"},{"key":"5_CR80","doi-asserted-by":"publisher","first-page":"34541","DOI":"10.1109\/ACCESS.2021.3061589","volume":"9","author":"R Ryu","year":"2021","unstructured":"Ryu, R., Yeom, S., Kim, S.H., Herbert, D.: Continuous multimodal biometric authentication schemes: a systematic review. IEEE Access 9, 34541\u201334557 (2021). https:\/\/doi.org\/10.1109\/ACCESS.2021.3061589","journal-title":"IEEE Access"},{"key":"5_CR81","doi-asserted-by":"publisher","DOI":"10.1016\/j.compeleceng.2022.107817","volume":"99","author":"AK Sahu","year":"2022","unstructured":"Sahu, A.K., Sharma, S., Raja, R.: Deep learning-based continuous authentication for an IoT-enabled healthcare service. Comput. Electr. Eng. 99, 107817 (2022). https:\/\/doi.org\/10.1016\/j.compeleceng.2022.107817","journal-title":"Comput. Electr. Eng."},{"key":"5_CR82","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2020.102168","volume":"103","author":"P Sanchez","year":"2021","unstructured":"Sanchez, P., Maimo, L.F., Celdran, A.H., Perez, G.M.: AuthCODE: a privacy-preserving and multi-device continuous authentication architecture based on machine and deep learning. Comput. Secur. 103, 102168 (2021). https:\/\/doi.org\/10.1016\/j.cose.2020.102168","journal-title":"Comput. Secur."},{"key":"5_CR83","doi-asserted-by":"publisher","unstructured":"Schiavone, E., Ceccarelli, A., Bondavalli, A.: Continuous biometric verification for non-repudiation of remote services. In: Proceedings of the 12th International Conference on Availability, Reliability and Security, ARES \u201917, pp. 1\u201310. Association for Computing Machinery, New York (2017). https:\/\/doi.org\/10.1145\/3098954.3098969","DOI":"10.1145\/3098954.3098969"},{"key":"5_CR84","doi-asserted-by":"publisher","first-page":"215","DOI":"10.1016\/j.cose.2015.05.009","volume":"53","author":"SF Shahandashti","year":"2015","unstructured":"Shahandashti, S.F., Safavi-Naini, R., Safa, N.A.: Reconciling user privacy and implicit authentication for mobile devices. Comput. Secur. 53, 215\u2013233 (2015). https:\/\/doi.org\/10.1016\/j.cose.2015.05.009","journal-title":"Comput. Secur."},{"key":"5_CR85","doi-asserted-by":"publisher","unstructured":"Shaji, S., Das, S., Kizhakkethottam, J.J.: Review of continuous touch based user authentication. In: 2015 International Conference on Soft-Computing and Networks Security (ICSNS), pp. 1\u20135 (2015). https:\/\/doi.org\/10.1109\/ICSNS.2015.7292380","DOI":"10.1109\/ICSNS.2015.7292380"},{"key":"5_CR86","doi-asserted-by":"publisher","unstructured":"Shepherd, C., Akram, R.N., Markantonakis, K.: Towards trusted execution of multi-modal continuous authentication schemes. In: Proceedings of the Symposium on Applied Computing, SAC \u201917, pp. 1444\u20131451. Association for Computing Machinery, New York (2017). https:\/\/doi.org\/10.1145\/3019612.3019652","DOI":"10.1145\/3019612.3019652"},{"key":"5_CR87","doi-asserted-by":"publisher","unstructured":"Shi, W., Yang, J., Jiang, Y., Yang, F., Xiong, Y.: SenGuard: passive user identification on smartphones using multiple sensors. In: 2011 IEEE 7th International Conference on Wireless and Mobile Computing, Networking and Communications (WiMob), pp. 141\u2013148 (2011). https:\/\/doi.org\/10.1109\/WiMOB.2011.6085412","DOI":"10.1109\/WiMOB.2011.6085412"},{"issue":"5","key":"5_CR88","doi-asserted-by":"publisher","first-page":"4042","DOI":"10.1109\/JIOT.2018.2851501","volume":"5","author":"DM Shila","year":"2018","unstructured":"Shila, D.M., Srivastava, K.: CASTRA: seamless and unobtrusive authentication of users to diverse mobile services. IEEE Internet Things J. 5(5), 4042\u20134057 (2018). https:\/\/doi.org\/10.1109\/JIOT.2018.2851501","journal-title":"IEEE Internet Things J."},{"key":"5_CR89","doi-asserted-by":"publisher","unstructured":"Shrestha, P., Saxena, N.: Hacksaw: biometric-free non-stop web authentication in an emerging world of wearables. In: Proceedings of the 13th ACM Conference on Security and Privacy in Wireless and Mobile Networks, WiSec \u201920, pp. 13\u201324. Association for Computing Machinery, New York (2020). https:\/\/doi.org\/10.1145\/3395351.3399366","DOI":"10.1145\/3395351.3399366"},{"key":"5_CR90","doi-asserted-by":"publisher","first-page":"76","DOI":"10.1016\/j.inffus.2020.08.021","volume":"66","author":"I Stylios","year":"2021","unstructured":"Stylios, I., Kokolakis, S., Thanou, O., Chatzis, S.: Behavioral biometrics & continuous user authentication on mobile devices: a survey. Inf. Fusion 66, 76\u201399 (2021). https:\/\/doi.org\/10.1016\/j.inffus.2020.08.021","journal-title":"Inf. Fusion"},{"issue":"5","key":"5_CR91","doi-asserted-by":"publisher","first-page":"687","DOI":"10.1108\/ICS-12-2021-0212","volume":"30","author":"I Stylios","year":"2022","unstructured":"Stylios, I., Skalkos, A., Kokolakis, S., Karyda, M.: BioPrivacy: a behavioral biometrics continuous authentication system based on keystroke dynamics and touch gestures. Inf. Comput. Secur. 30(5), 687\u2013704 (2022). https:\/\/doi.org\/10.1108\/ICS-12-2021-0212","journal-title":"Inf. Comput. Secur."},{"key":"5_CR92","doi-asserted-by":"crossref","unstructured":"Stylios, I.C., Thanou, O., Androulidakis, I., Zaitseva, E.: A review of continuous authentication using behavioral biometrics. In: Proceedings of the SouthEast European Design Automation, Computer Engineering, Computer Networks and Social Media Conference, SEEDA-CECNSM \u201916, pp. 72\u201379. Association for Computing Machinery, New York (2016)","DOI":"10.1145\/2984393.2984403"},{"key":"5_CR93","series-title":"Communications in Computer and Information Science","doi-asserted-by":"publisher","first-page":"73","DOI":"10.1007\/978-981-15-1301-5_7","volume-title":"Smart City and Informatization","author":"PM S\u00e1nchez S\u00e1nchez","year":"2019","unstructured":"S\u00e1nchez S\u00e1nchez, P.M., Huertas Celdr\u00e1n, A., Fern\u00e1ndez Maim\u00f3, L., Mart\u00ednez P\u00e9rez, G., Wang, G.: Securing smart offices through an intelligent and multi-device continuous authentication system. In: Wang, G., El Saddik, A., Lai, X., Martinez Perez, G., Choo, K.-K.R. (eds.) iSCI 2019. CCIS, vol. 1122, pp. 73\u201385. Springer, Singapore (2019). https:\/\/doi.org\/10.1007\/978-981-15-1301-5_7"},{"key":"5_CR94","unstructured":"Texas Legislature: Texas Business & Commerce Code 503.001 \u2013 Capture or Use of Biometric Identifiers Act (2009)"},{"key":"5_CR95","doi-asserted-by":"publisher","first-page":"73","DOI":"10.1007\/978-3-319-48947-6_6","volume-title":"Information Security Practices","author":"I Traor\u00e9","year":"2017","unstructured":"Traor\u00e9, I., Nakkabi, Y., Saad, S., Sayed, B., Ardigo, J.D., de Faria Quinan, P.M.: Ensuring online exam integrity through continuous biometric authentication. In: Traor\u00e9, I., Awad, A., Woungang, I. (eds.) Information Security Practices, pp. 73\u201381. Springer, Cham (2017). https:\/\/doi.org\/10.1007\/978-3-319-48947-6_6"},{"issue":"1","key":"5_CR96","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/3546069","volume":"26","author":"S Wiefling","year":"2023","unstructured":"Wiefling, S., J\u00f8rgensen, P.R., Thunem, S., Iacono, L.L.: Pump up password security! evaluating and enhancing risk-based authentication on a real-world large-scale online service. ACM Trans. Priv. Secur. 26(1), 1\u201336 (2023). https:\/\/doi.org\/10.1145\/3546069","journal-title":"ACM Trans. Priv. Secur."},{"key":"5_CR97","doi-asserted-by":"publisher","unstructured":"Wu, C., He, K., Chen, J., Du, R.: ICAuth: implicit and continuous authentication when the screen is awake. In: ICC 2019 - 2019 IEEE International Conference on Communications (ICC), pp. 1\u20136 (2019). https:\/\/doi.org\/10.1109\/ICC.2019.8761435","DOI":"10.1109\/ICC.2019.8761435"},{"key":"5_CR98","doi-asserted-by":"publisher","DOI":"10.1016\/j.adhoc.2020.102218","volume":"107","author":"W Xu","year":"2020","unstructured":"Xu, W., Shen, Y., Luo, C., Li, J., Li, W., Zomaya, A.Y.: Gait-watch: a gait-based context-aware authentication system for smart watch via sparse coding. Ad Hoc Netw. 107, 102218 (2020). https:\/\/doi.org\/10.1016\/j.adhoc.2020.102218","journal-title":"Ad Hoc Netw."},{"key":"5_CR99","doi-asserted-by":"publisher","unstructured":"Yang, H., et al.: CKDAN: content and keystroke dual attention networks with pre-trained models for continuous authentication. Comput. Secur. 128 (2023). https:\/\/doi.org\/10.1016\/j.cose.2023.103159","DOI":"10.1016\/j.cose.2023.103159"},{"key":"5_CR100","doi-asserted-by":"publisher","unstructured":"Yang, L., Li, C., You, R., Tu, B.: A keystroke-based continuous user authentication in virtual desktop infrastructure. In: 2021 IEEE 6th International Conference on Computer and Communication Systems (ICCCS), pp. 753\u2013758 (2021). https:\/\/doi.org\/10.1109\/ICCCS52626.2021.9449286","DOI":"10.1109\/ICCCS52626.2021.9449286"},{"key":"5_CR101","doi-asserted-by":"publisher","unstructured":"Yi, X., Paulet, R., Bertino, E.: Homomorphic encryption and applications. In: SpringerBriefs in Computer Science, Springer, Cham (2014). https:\/\/doi.org\/10.1007\/978-3-319-12229-8","DOI":"10.1007\/978-3-319-12229-8"},{"key":"5_CR102","doi-asserted-by":"publisher","unstructured":"Zaidi, A.Z., Chong, C.Y., Jin, Z., Parthiban, R., Sadiq, A.S.: Touch-based continuous mobile device authentication: state-of-the-art, challenges and opportunities. J. Netw. Comput. Appl. 191 (2021). https:\/\/doi.org\/10.1016\/j.jnca.2021.103162","DOI":"10.1016\/j.jnca.2021.103162"},{"key":"5_CR103","doi-asserted-by":"publisher","first-page":"244","DOI":"10.1016\/j.comcom.2023.06.016","volume":"208","author":"J Zhang","year":"2023","unstructured":"Zhang, J., Li, Z., Zhang, H., Zhang, W., Ling, Z., Yang, M.: Sensor-based implicit authentication through learning user physiological and behavioral characteristics. Comput. Commun. 208, 244\u2013255 (2023). https:\/\/doi.org\/10.1016\/j.comcom.2023.06.016","journal-title":"Comput. Commun."},{"issue":"2","key":"5_CR104","doi-asserted-by":"publisher","first-page":"466","DOI":"10.1109\/TMC.2019.2892440","volume":"19","author":"T Zhu","year":"2020","unstructured":"Zhu, T., et al.: RiskCog: unobtrusive real-time user authentication on mobile devices in the wild. IEEE Trans. Mob. Comput. 19(2), 466\u2013483 (2020). https:\/\/doi.org\/10.1109\/TMC.2019.2892440","journal-title":"IEEE Trans. Mob. Comput."}],"container-title":["Lecture Notes in Computer Science","Applied Cryptography and Network Security"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-031-95767-3_5","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T12:25:28Z","timestamp":1750335928000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-031-95767-3_5"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025]]},"ISBN":["9783031957666","9783031957673"],"references-count":104,"URL":"https:\/\/doi.org\/10.1007\/978-3-031-95767-3_5","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2025]]},"assertion":[{"value":"20 June 2025","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"ACNS","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Applied Cryptography and Network Security","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Munich","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Germany","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2025","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"23 June 2025","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"26 June 2025","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"23","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"acns2025","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/acns2025.fordaysec.de\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}