{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,9,28]],"date-time":"2025-09-28T20:37:01Z","timestamp":1759091821457},"publisher-location":"Cham","reference-count":42,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319113784"},{"type":"electronic","value":"9783319113791"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2014]]},"DOI":"10.1007\/978-3-319-11379-1_13","type":"book-chapter","created":{"date-parts":[[2014,8,20]],"date-time":"2014-08-20T03:14:54Z","timestamp":1408504494000},"page":"255-275","source":"Crossref","is-referenced-by-count":15,"title":["A Comparative Evaluation of Implicit Authentication Schemes"],"prefix":"10.1007","author":[{"given":"Hassan","family":"Khan","sequence":"first","affiliation":[]},{"given":"Aaron","family":"Atwater","sequence":"additional","affiliation":[]},{"given":"Urs","family":"Hengartner","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"13_CR1","unstructured":"Android Authority: Android face unlock hacked (March 2014), http:\/\/androidauthority.com\/android-jelly-bean-face-unlock-blink-hacking-105556\/"},{"key":"13_CR2","doi-asserted-by":"crossref","unstructured":"Arya, S., Mount, D.M., Netanyahu, N.S., Silverman, R., Wu, A.Y.: An optimal algorithm for approximate nearest neighbor searching fixed dimensions. Journal of the ACM (JACM) 45(6) (1998)","DOI":"10.1145\/293347.293348"},{"key":"13_CR3","unstructured":"Berndt, D.J., Clifford, J.: Using dynamic time warping to find patterns in time series. In: KDD Workshop, vol.\u00a010 (1994)"},{"key":"13_CR4","doi-asserted-by":"crossref","unstructured":"Bo, C., Zhang, L., Li, X.Y., Huang, Q., Wang, Y.: Silentsense: silent user identification via touch and movement behavioral biometrics. In: MobiCom. ACM (2013)","DOI":"10.1145\/2500423.2504572"},{"key":"13_CR5","doi-asserted-by":"crossref","unstructured":"Chang, C.C., Lin, C.J.: Libsvm: A library for support vector machines. ACM TIST 2(3) (2011)","DOI":"10.1145\/1961189.1961199"},{"issue":"2","key":"13_CR6","first-page":"299","volume":"47","author":"T. Chen","year":"2013","unstructured":"Chen, T., Kan, M.-Y.: Creating a live, public short message service corpus: The nus sms corpus. Language Resources and Evaluation\u00a047(2), 299\u2013335 (2013)","journal-title":"Language Resources and Evaluation"},{"key":"13_CR7","series-title":"IFIP AICT","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/978-3-642-01244-0_1","volume-title":"Emerging Challenges for Security, Privacy and Trust","author":"N. Clarke","year":"2009","unstructured":"Clarke, N., Karatzouni, S., Furnell, S.: Flexible and transparent user authentication for mobile devices. In: Gritzalis, D., Lopez, J. (eds.) SEC 2009. IFIP AICT, vol.\u00a0297, pp. 1\u201312. Springer, Heidelberg (2009)"},{"key":"13_CR8","doi-asserted-by":"crossref","unstructured":"Clarke, N.L., Furnell, S.: Authenticating mobile phone users using keystroke analysis. International Journal of Information Security 6(1) (2007)","DOI":"10.1007\/s10207-006-0006-6"},{"key":"13_CR9","doi-asserted-by":"crossref","unstructured":"Crawford, H., Renaud, K., Storer, T.: A framework for continuous, transparent mobile device authentication. Elsevier Computers & Security 39 (2013)","DOI":"10.1016\/j.cose.2013.05.005"},{"key":"13_CR10","doi-asserted-by":"crossref","unstructured":"De Luca, A., Hang, A., Brudy, F., Lindner, C., Hussmann, H.: Touch me once and i know it\u2019s you!: implicit authentication based on touch screen patterns. In: CHI. ACM (2012)","DOI":"10.1145\/2207676.2208544"},{"key":"13_CR11","doi-asserted-by":"crossref","unstructured":"Feng, T., Liu, Z., Kwon, K.A., Shi, W., Carbunar, B., Jiang, Y., Nguyen, N.: Continuous mobile authentication using touchscreen gestures. In: HST. IEEE (2012)","DOI":"10.1109\/THS.2012.6459891"},{"key":"13_CR12","doi-asserted-by":"crossref","unstructured":"Feng, T., Yang, J., Yan, Z., Tapia, E.M., Shi, W.: Tips: Context-aware implicit user identification using touch screen in uncontrolled environments. In: HotMobile. ACM (2014)","DOI":"10.1145\/2565585.2565592"},{"key":"13_CR13","doi-asserted-by":"crossref","unstructured":"Feng, T., Zhao, X., Carbunar, B., Shi, W.: Continuous mobile authentication using virtual key typing biometrics. In: TrustCom. IEEE (2013)","DOI":"10.1109\/TrustCom.2013.272"},{"key":"13_CR14","doi-asserted-by":"crossref","unstructured":"Frank, J., Mannor, S., Precup, D.: Activity and gait recognition with time-delay embeddings. In: AAAI (2010)","DOI":"10.1609\/aaai.v24i1.7724"},{"key":"13_CR15","doi-asserted-by":"crossref","unstructured":"Frank, M., Biedert, R., Ma, E., Martinovic, I., Song, D.: Touchalytics: On the applicability of touchscreen input as a behavioral biometric for continuous authentication. IEEE TIFS 8(1) (2013)","DOI":"10.1109\/TIFS.2012.2225048"},{"key":"13_CR16","doi-asserted-by":"crossref","unstructured":"Friedman, N., Geiger, D., Goldszmidt, M.: Bayesian network classifiers. Machine Learning 29(2-3) (1997)","DOI":"10.1023\/A:1007465528199"},{"key":"13_CR17","doi-asserted-by":"crossref","unstructured":"Gafurov, D., Helkala, K., S\u00f8ndrol, T.: Biometric gait authentication using accelerometer sensor. Journal of Computers 1(7) (2006)","DOI":"10.4304\/jcp.1.7.51-59"},{"key":"13_CR18","doi-asserted-by":"crossref","unstructured":"Hayashi, E., Riva, O., Strauss, K., Brush, A., Schechter, S.: Goldilocks and the two mobile devices: Going beyond all-or-nothing access to a device\u2019s applications. In: SOUPS. ACM (2012)","DOI":"10.1145\/2335356.2335359"},{"key":"13_CR19","doi-asserted-by":"crossref","unstructured":"Jain, A.K., Ross, A., Prabhakar, S.: An introduction to biometric recognition. IEEE Transactions on Circuits and Systems for Video Technology 14(1) (2004)","DOI":"10.1109\/TCSVT.2003.818349"},{"key":"13_CR20","doi-asserted-by":"crossref","unstructured":"Jolliffe, I.: Principal component analysis. Wiley Online Library (2005)","DOI":"10.1002\/0470013192.bsa501"},{"key":"13_CR21","doi-asserted-by":"crossref","unstructured":"Kalamandeen, A., Scannell, A., de Lara, E., Sheth, A., LaMarca, A.: Ensemble: Cooperative proximity-based authentication. In: MobiSys. ACM (2010)","DOI":"10.1145\/1814433.1814466"},{"key":"13_CR22","doi-asserted-by":"crossref","unstructured":"Khan, H., Hengartner, U.: Towards application-centric implicit authentication on smartphones. In: HotMobile. ACM (2014)","DOI":"10.1145\/2565585.2565590"},{"key":"13_CR23","unstructured":"Klimt, B., Yang, Y.: Introducing the enron corpus. In: CEAS (2004)"},{"key":"13_CR24","doi-asserted-by":"crossref","unstructured":"Li, L., Zhao, X., Xue, G.: Unobservable reauthentication for smart phones. In: NDSS (2013)","DOI":"10.1109\/INFCOM.2013.6566798"},{"key":"13_CR25","unstructured":"Lookout Blog: Sprint-lookout mobile behavior survey (March 2014), http:\/\/blog.lookout.com\/blog\/2013\/10\/21"},{"key":"13_CR26","doi-asserted-by":"crossref","unstructured":"Maiorana, E., Campisi, P., Gonz\u00e1lez-Carballo, N., Neri, A.: Keystroke dynamics authentication for mobile phones. In: SAC. ACM (2011)","DOI":"10.1145\/1982185.1982190"},{"key":"13_CR27","unstructured":"Mantyjarvi, J., Lindholm, M., Vildjiounaite, E., Makela, S.M., Ailisto, H.: Identifying users of portable devices from gait pattern with accelerometers. In: ICASSP 2005. IEEE (2005)"},{"key":"13_CR28","doi-asserted-by":"crossref","unstructured":"Muaaz, M., Mayrhofer, R.: An analysis of different approaches to gait recognition using cell phone based accelerometers. In: MoMM. ACM (2013)","DOI":"10.1145\/2536853.2536895"},{"key":"13_CR29","unstructured":"Riva, O., Qin, C., Strauss, K., Lymberopoulos, D.: Progressive authentication: deciding when to authenticate on mobile phones. In: USENIX Security (2012)"},{"key":"13_CR30","unstructured":"Schneier on Security: Apple iphone fingerprint reader hacked (March 2014), http:\/\/schneier.com\/blog\/archives\/2013\/09\/apples_iphone_f.html"},{"key":"13_CR31","doi-asserted-by":"crossref","unstructured":"Serwadda, A., Phoha, V.V.: Examining a large keystroke biometrics dataset for statistical-attack openings. ACM TISSEC 16(2) (2013)","DOI":"10.1145\/2516951.2516960"},{"key":"13_CR32","doi-asserted-by":"crossref","unstructured":"Serwadda, A., Phoha, V.V.: When kids\u2019 toys breach mobile phone security. In: CCS. ACM (2013)","DOI":"10.1145\/2508859.2516659"},{"key":"13_CR33","doi-asserted-by":"crossref","unstructured":"Serwadda, A., Phoha, V.V., Wang, Z.: Which verifiers work?: A benchmark evaluation of touch-based authentication algorithms. In: BTAS. IEEE (2013)","DOI":"10.1109\/BTAS.2013.6712758"},{"key":"13_CR34","doi-asserted-by":"crossref","unstructured":"Shahzad, M., Liu, A.X., Samuel, A.: Secure unlocking of mobile touch screen devices by simple gestures: you can see it but you can not do it. In: MobiCom. ACM (2013)","DOI":"10.1145\/2500423.2500434"},{"key":"13_CR35","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"99","DOI":"10.1007\/978-3-642-18178-8_9","volume-title":"Information Security","author":"E. Shi","year":"2011","unstructured":"Shi, E., Niu, Y., Jakobsson, M., Chow, R.: Implicit authentication through learning user behavior. In: Burmester, M., Tsudik, G., Magliveras, S., Ili\u0107, I. (eds.) ISC 2010. LNCS, vol.\u00a06531, pp. 99\u2013113. Springer, Heidelberg (2011)"},{"key":"13_CR36","doi-asserted-by":"crossref","unstructured":"Shrestha, B., Saxena, N., Truong, H.T.T., Asokan, N.: Drone to the rescue: Relay-resilient authentication using ambient multi-sensing. In: Financial Cryptography and Data Security (2014)","DOI":"10.1007\/978-3-662-45472-5_23"},{"key":"13_CR37","doi-asserted-by":"crossref","unstructured":"Striegel, A., Liu, S., Meng, L., Poellabauer, C., Hachen, D., Lizardo, O.: Lessons learned from the netsense smartphone study. In: HotPlanet. ACM (2013)","DOI":"10.1145\/2491159.2491171"},{"key":"13_CR38","doi-asserted-by":"crossref","unstructured":"Studer, A., Perrig, A.: Mobile user location-specific encryption (mule): Using your office as your password. In: Wi\u2019Sec. ACM (2010)","DOI":"10.1145\/1741866.1741892"},{"key":"13_CR39","unstructured":"Tey, C.M., Gupta, P., Gao, D.: I can be you: Questioning the use of keystroke dynamics as biometrics. In: NDSS (2013)"},{"key":"13_CR40","unstructured":"Threatpost: Samsung android lockscreen bypass (March 2014), http:\/\/threatpost.com\/lock-screen-bypass-flaw-found-samsung-androids-030413\/77580"},{"key":"13_CR41","unstructured":"Wright, S.: Symantec honey stick project. Symantec Corporation (March 2012)"},{"key":"13_CR42","doi-asserted-by":"crossref","unstructured":"Zhao, X., Feng, T., Shi, W.: Continuous mobile authentication using a novel graphic touch gesture feature. In: BTAS. IEEE (2013)","DOI":"10.1109\/BTAS.2013.6712747"}],"container-title":["Lecture Notes in Computer Science","Research in Attacks, Intrusions and Defenses"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-11379-1_13","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,7,16]],"date-time":"2023-07-16T04:12:52Z","timestamp":1689480772000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-11379-1_13"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014]]},"ISBN":["9783319113784","9783319113791"],"references-count":42,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-11379-1_13","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2014]]}}}