{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,5,4]],"date-time":"2025-05-04T04:01:52Z","timestamp":1746331312927,"version":"3.40.4"},"publisher-location":"Cham","reference-count":24,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319077758"},{"type":"electronic","value":"9783319077765"}],"license":[{"start":{"date-parts":[[2014,1,1]],"date-time":"2014-01-01T00:00:00Z","timestamp":1388534400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2014,1,1]],"date-time":"2014-01-01T00:00:00Z","timestamp":1388534400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2014]]},"DOI":"10.1007\/978-3-319-07776-5_17","type":"book-chapter","created":{"date-parts":[[2014,5,26]],"date-time":"2014-05-26T14:36:47Z","timestamp":1401115007000},"page":"155-163","source":"Crossref","is-referenced-by-count":0,"title":["A Security System Based on Door Movement Detecting"],"prefix":"10.1007","author":[{"given":"Ci-Rong","family":"Li","sequence":"first","affiliation":[]},{"given":"Chie-Yang","family":"Kuan","sequence":"additional","affiliation":[]},{"given":"Bing-Zhe","family":"He","sequence":"additional","affiliation":[]},{"given":"Wu-En","family":"Wu","sequence":"additional","affiliation":[]},{"given":"Chi-Yao","family":"Weng","sequence":"additional","affiliation":[]},{"given":"Hung-Min","family":"Sun","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"17_CR1","unstructured":"Security company, http:\/\/www.boschsecurity.com.tw\/content\/language1\/html\/55_CHT_XHTML.asp"},{"key":"17_CR2","unstructured":"Android sensor, http:\/\/developer.android.com\/reference\/android\/hardware\/Sensor.html"},{"key":"17_CR3","unstructured":"Comparison of smartphones, http:\/\/en.wikipedia.org\/wiki\/Comparison_of_smartphones"},{"key":"17_CR4","unstructured":"Ravindranath, L., Newport, C., Balakrishnan, H., Madden, S.: Improving wireless network performance using sensor hints. In: Proceedings of the 8th USENIX Conference on Networked Systems Design and Implementation, p. 21. USENIX Association (2011)"},{"key":"17_CR5","unstructured":"Motorola motox, http:\/\/www.motorola.com\/us\/consumers\/Moto-X\/moto-x,en_US,pg.html"},{"key":"17_CR6","doi-asserted-by":"crossref","unstructured":"Wang, E.K., Ye, Y., Xu, X.: Location-based distributed group key agreement scheme for vehicular ad hoc network. International Journal of Distributed Sensor Networks 2014 (2014)","DOI":"10.1155\/2014\/759601"},{"issue":"5","key":"17_CR7","first-page":"1682","volume":"86","author":"K. Wei-Chi","year":"2003","unstructured":"Wei-Chi, K., Chien-Ming, C., Hui-Lung, L.: Cryptanalysis of a variant of peyravian-zunic\u2019s password authentication scheme. IEICE Transactions on Communications\u00a086(5), 1682\u20131684 (2003)","journal-title":"IEICE Transactions on Communications"},{"issue":"2","key":"17_CR8","doi-asserted-by":"publisher","first-page":"426","DOI":"10.1016\/j.eswa.2013.07.068","volume":"41","author":"C.M. Chen","year":"2014","unstructured":"Chen, C.M., Chen, Y.H., Lin, Y.H., Sun, H.M.: Eliminating rouge femtocells based on distance bounding protocol and geographic information. Expert Systems with Applications\u00a041(2), 426\u2013433 (2014)","journal-title":"Expert Systems with Applications"},{"issue":"5","key":"17_CR9","doi-asserted-by":"publisher","first-page":"2345","DOI":"10.1016\/j.eswa.2013.09.032","volume":"41","author":"B.Z. He","year":"2014","unstructured":"He, B.Z., Chen, C.M., Su, Y.P., Sun, H.M.: A defence scheme against identity theft attack based on multiple social networks. Expert Systems with Applications\u00a041(5), 2345\u20132352 (2014)","journal-title":"Expert Systems with Applications"},{"issue":"6","key":"17_CR10","doi-asserted-by":"publisher","first-page":"813","DOI":"10.1109\/TC.2011.46","volume":"60","author":"H.M. Sun","year":"2011","unstructured":"Sun, H.M., Wang, H., Wang, K.H., Chen, C.M.: A native apis protection mechanism in the kernel mode against malicious code. IEEE Transactions on Computers\u00a060(6), 813\u2013823 (2011)","journal-title":"IEEE Transactions on Computers"},{"issue":"1","key":"17_CR11","doi-asserted-by":"publisher","first-page":"28","DOI":"10.1002\/sec.522","volume":"6","author":"T.Y. Wu","year":"2013","unstructured":"Wu, T.Y., Tseng, Y.M.: Further analysis of pairing-based traitor tracing schemes for broadcast encryption. Security and Communication Networks\u00a06(1), 28\u201332 (2013)","journal-title":"Security and Communication Networks"},{"issue":"8","key":"17_CR12","doi-asserted-by":"publisher","first-page":"1318","DOI":"10.1109\/TIFS.2013.2270106","volume":"8","author":"C.M. Chen","year":"2013","unstructured":"Chen, C.M., Wang, K.H., Wu, T.Y., Pan, J.S., Sun, H.M.: A scalable transitive human-verifiable authentication protocol for mobile devices. IEEE Transactions on Information Forensics and Security\u00a08(8), 1318\u20131330 (2013)","journal-title":"IEEE Transactions on Information Forensics and Security"},{"issue":"1","key":"17_CR13","doi-asserted-by":"publisher","first-page":"57","DOI":"10.4236\/jsip.2013.41007","volume":"4","author":"C.M. Chen","year":"2013","unstructured":"Chen, C.M., Lin, Y.H., Chen, Y.H., Sun, H.M.: Sashimi: secure aggregation via successively hierarchical inspecting of message integrity on wsn. Journal of Information Hiding and Multimedia Signal Processing\u00a04(1), 57\u201372 (2013)","journal-title":"Journal of Information Hiding and Multimedia Signal Processing"},{"key":"17_CR14","doi-asserted-by":"crossref","unstructured":"He, Z.Y., Jin, L.W.: Activity recognition from acceleration data using ar model representation and svm. In: 2008 International Conference on Machine Learning and Cybernetics, vol.\u00a04, pp. 2245\u20132250. IEEE (2008)","DOI":"10.1109\/ICMLC.2008.4620779"},{"key":"17_CR15","doi-asserted-by":"crossref","unstructured":"He, Z., Jin, L.: Activity recognition from acceleration data based on discrete consine transform and svm. In: IEEE International Conference on Systems, Man and Cybernetics, SMC 2009, pp. 5041\u20135044. IEEE (2009)","DOI":"10.1109\/ICSMC.2009.5346042"},{"key":"17_CR16","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/978-3-540-24646-6_1","volume-title":"Pervasive Computing","author":"L. Bao","year":"2004","unstructured":"Bao, L., Intille, S.S.: Activity recognition from user-annotated acceleration data. In: Ferscha, A., Mattern, F. (eds.) PERVASIVE 2004. LNCS, vol.\u00a03001, pp. 1\u201317. Springer, Heidelberg (2004)"},{"key":"17_CR17","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"289","DOI":"10.1007\/978-3-642-21257-4_36","volume-title":"Pattern Recognition and Image Analysis","author":"P. Casale","year":"2011","unstructured":"Casale, P., Pujol, O., Radeva, P.: Human activity recognition from accelerometer data using a wearable device. In: Vitri\u00e0, J., Sanches, J.M., Hern\u00e1ndez, M. (eds.) IbPRIA 2011. LNCS, vol.\u00a06669, pp. 289\u2013296. Springer, Heidelberg (2011)"},{"key":"17_CR18","unstructured":"Ravi, N., Dandekar, N., Mysore, P., Littman, M.L.: Activity recognition from accelerometer data. In: AAAI, pp. 1541\u20131546 (2005)"},{"key":"17_CR19","doi-asserted-by":"crossref","unstructured":"Shin, S.H., Yeo, J.Y., Ji, S.H., Jeong, G.M.: An analysis of vibration sensors for smartphone applications using camera. In: 2011 International Conference on ICT Convergence (ICTC), pp. 772\u2013773. IEEE (2011)","DOI":"10.1109\/ICTC.2011.6082532"},{"key":"17_CR20","doi-asserted-by":"crossref","unstructured":"Xu, Z., Bai, K., Zhu, S.: Taplogger: Inferring user inputs on smartphone touchscreens using on-board motion sensors. In: Proceedings of the Fifth ACM Conference on Security and Privacy in Wireless and Mobile Networks, pp. 113\u2013124. ACM (2012)","DOI":"10.1145\/2185448.2185465"},{"key":"17_CR21","unstructured":"Cai, L., Chen, H.: Touchlogger: inferring keystrokes on touch screen from smartphone motion. In: Proceedings of the 6th USENIX Conference on Hot Topics in Security, p. 9. USENIX Association (2011)"},{"key":"17_CR22","doi-asserted-by":"crossref","unstructured":"Owusu, E., Han, J., Das, S., Perrig, A., Zhang, J.: Accessory: password inference using accelerometers on smartphones. In: Proceedings of the Twelfth Workshop on Mobile Computing Systems & Applications, p. 9. ACM (2012)","DOI":"10.1145\/2162081.2162095"},{"key":"17_CR23","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"273","DOI":"10.1007\/978-3-642-30921-2_16","volume-title":"Trust and Trustworthy Computing","author":"L. Cai","year":"2012","unstructured":"Cai, L., Chen, H.: On the practicality of motion based keystroke inference attack. In: Katzenbeisser, S., Weippl, E., Camp, L.J., Volkamer, M., Reiter, M., Zhang, X. (eds.) Trust 2012. LNCS, vol.\u00a07344, pp. 273\u2013290. Springer, Heidelberg (2012)"},{"key":"17_CR24","doi-asserted-by":"crossref","unstructured":"Han, J., Owusu, E., Nguyen, L.T., Perrig, A., Zhang, J.: Accomplice: Location inference using accelerometers on smartphones. In: 2012 Fourth International Conference on Communication Systems and Networks (COMSNETS), pp. 1\u20139. IEEE (2012)","DOI":"10.1109\/COMSNETS.2012.6151305"}],"container-title":["Advances in Intelligent Systems and Computing","Intelligent Data analysis and its Applications, Volume I"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-07776-5_17","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,5,3]],"date-time":"2025-05-03T03:22:13Z","timestamp":1746242533000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-319-07776-5_17"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014]]},"ISBN":["9783319077758","9783319077765"],"references-count":24,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-07776-5_17","relation":{},"ISSN":["2194-5357","2194-5365"],"issn-type":[{"type":"print","value":"2194-5357"},{"type":"electronic","value":"2194-5365"}],"subject":[],"published":{"date-parts":[[2014]]}}}