{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,5,30]],"date-time":"2025-05-30T04:05:41Z","timestamp":1748577941061,"version":"3.41.0"},"publisher-location":"Cham","reference-count":36,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319206776"},{"type":"electronic","value":"9783319206783"}],"license":[{"start":{"date-parts":[[2015,1,1]],"date-time":"2015-01-01T00:00:00Z","timestamp":1420070400000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2015]]},"DOI":"10.1007\/978-3-319-20678-3_32","type":"book-chapter","created":{"date-parts":[[2015,7,17]],"date-time":"2015-07-17T16:47:59Z","timestamp":1437151679000},"page":"330-339","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["Behavioral Biometrics for Universal Access and Authentication"],"prefix":"10.1007","author":[{"given":"Liam M.","family":"Mayron","sequence":"first","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2015,7,18]]},"reference":[{"key":"32_CR1","doi-asserted-by":"publisher","first-page":"254","DOI":"10.1007\/978-3-642-14292-5_27","volume-title":"Networked Digital Technologies","author":"F Al-Harby","year":"2010","unstructured":"Al-Harby, F., Qahwaji, R., Kamala, M.: Users acceptance of secure biometrics authentication system: reliability and validate of an extended utaut model. In: Zavoral, F., Yaghob, J., Pichappan, P., El-Qawasmeh, E. (eds.) Networked Digital Technologies, pp. 254\u2013258. Springer, Heidelberg (2010)"},{"key":"32_CR2","series-title":"Design for All and eInclusion, Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"433","DOI":"10.1007\/978-3-642-21672-5_47","volume-title":"Universal Access in Human-Computer Interaction","author":"G Bahr","year":"2011","unstructured":"Bahr, G., Mayron, L., Gacey, H.: Cyber risks to secure and private universal access. In: Stephanidis, C. (ed.) Universal Access in Human-Computer Interaction. Design for All and eInclusion, Lecture Notes in Computer Science, vol. 6765, pp. 433\u2013442. Springer, Berlin Heidelberg (2011)"},{"key":"32_CR3","doi-asserted-by":"crossref","unstructured":"Braz, C., Robert, J.: Security and usability: the case of the user authentication methods. In: Proceedings of the 18th International Conference of the Association Francophone d\u2019Interaction Homme-Machine, pp. 199\u2013203. ACM (2006)","DOI":"10.1145\/1132736.1132768"},{"key":"32_CR4","first-page":"405","volume-title":"People and Computers","author":"S Brostoff","year":"2000","unstructured":"Brostoff, S., Sasse, M.A.: Are passfaces more usable than passwords? a field trial investigation. People and Computers, pp. 405\u2013424. Springer, London (2000)"},{"key":"32_CR5","doi-asserted-by":"crossref","unstructured":"Burrows, M., Abadi, M., Needham, R.M.: A logic of authentication. In: Proceedings of the Royal Society of London A: Mathematical, Physical and Engineering Sciences, vol. 426, pp. 233\u2013271. The Royal Society (1989)","DOI":"10.1098\/rspa.1989.0125"},{"key":"32_CR6","unstructured":"Bursztein, E., Bethard, S.: Decaptcha: breaking 75% of ebay audio captchas. In: Proceedings of the 3rd USENIX conference on Offensive technologies, p. 8. USENIX Association (2009)"},{"key":"32_CR7","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"443","DOI":"10.1007\/978-3-642-21672-5_48","volume-title":"Universal Access in Human-Computer Interaction","author":"S Cohen","year":"2011","unstructured":"Cohen, S., Ben-Asher, N., Meyer, J.: Towards information technology security for universal access. In: Stephanidis, C. (ed.) Universal Access in HCI, Part I, HCII 2011. LNCS, vol. 6765, pp. 443\u2013451. Springer, Heidelberg (2011)"},{"issue":"5","key":"32_CR8","doi-asserted-by":"publisher","first-page":"16","DOI":"10.1109\/MSP.2004.69","volume":"2","author":"L Cranor","year":"2004","unstructured":"Cranor, L., Garfinkel, S.: Guest editors\u2019 introduction: secure or usable? IEEE Secur. Priv. 2(5), 16\u201318 (2004)","journal-title":"IEEE Secur. Priv."},{"key":"32_CR9","doi-asserted-by":"publisher","first-page":"G84","DOI":"10.1162\/089892906775249997","volume":"18","author":"S Dalla Bella","year":"2006","unstructured":"Dalla Bella, S., Palmer, C.: Personal identifiers in musicians\u2019 finger movement dynamics. J. Cog. Neurosci. 18, G84 (2006)","journal-title":"J. Cog. Neurosci."},{"key":"32_CR10","doi-asserted-by":"crossref","unstructured":"Epp, C., Lippold, M., Mandryk, R.L.: Identifying emotional states using keystroke dynamics. In: Proceedings of the SIGCHI Conference on Human Factors in Computing Systems, pp. 715\u2013724. ACM (2011)","DOI":"10.1145\/1978942.1979046"},{"key":"32_CR11","unstructured":"Gafurov, D.: A survey of biometric gait recognition: approaches, security and challenges. In: Annual Norwegian Computer Science Conference, pp. 19\u201321. Citeseer (2007)"},{"issue":"7","key":"32_CR12","doi-asserted-by":"publisher","first-page":"51","DOI":"10.4304\/jcp.1.7.51-59","volume":"1","author":"D Gafurov","year":"2006","unstructured":"Gafurov, D., Helkala, K., S\u00f8ndrol, T.: Biometric gait authentication using accelerometer sensor. J. Comput. 1(7), 51\u201359 (2006)","journal-title":"J. Comput."},{"key":"32_CR13","doi-asserted-by":"crossref","unstructured":"Gamboa, H., Fred, A.: A behavioral biometric system based on human-computer interaction. In: Defense and Security, pp. 381\u2013392. International Society for Optics and Photonics (2004)","DOI":"10.1117\/12.542625"},{"key":"32_CR14","volume-title":"Security Policies and Procedures: Principles and Practices (Prentice Hall Security Series)","author":"S Greene","year":"2005","unstructured":"Greene, S.: Security Policies and Procedures: Principles and Practices (Prentice Hall Security Series). Prentice-Hall Inc, Upper Saddle River (2005)"},{"key":"32_CR15","unstructured":"Harbach, M., von Zezschwitz, E., Fichtner, A., De Luca, A., Smith, M.: Itsa hard lock life: a field study of smartphone (un) locking behavior and risk perception. In: Symposium on Usable Privacy and Security (SOUPS) (2014)"},{"issue":"1","key":"32_CR16","doi-asserted-by":"publisher","first-page":"85","DOI":"10.1016\/j.cose.2008.10.002","volume":"28","author":"S Hwang","year":"2009","unstructured":"Hwang, S., Cho, S., Park, S.: Keystroke dynamics-based authentication for mobile devices. Comput. Secur. 28(1), 85\u201393 (2009)","journal-title":"Comput. Secur."},{"issue":"4","key":"32_CR17","doi-asserted-by":"publisher","first-page":"75","DOI":"10.1145\/975817.975820","volume":"47","author":"B Ives","year":"2004","unstructured":"Ives, B., Walsh, K.R., Schneider, H.: The domino effect of password reuse. Commun. ACM 47(4), 75\u201378 (2004)","journal-title":"Commun. ACM"},{"key":"32_CR18","doi-asserted-by":"publisher","DOI":"10.1007\/978-0-387-77326-1","volume-title":"Introduction to Biometrics","author":"A Jain","year":"2011","unstructured":"Jain, A., Ross, A., Nandakumar, K.: Introduction to Biometrics. Springer, US (2011)"},{"issue":"5","key":"32_CR19","first-page":"107","volume":"2","author":"N Kumar","year":"2011","unstructured":"Kumar, N.: Password in practice: a usability study. J. Global Res. Comput. Sci. 2(5), 107\u2013112 (2011)","journal-title":"J. Global Res. Comput. Sci."},{"key":"32_CR20","doi-asserted-by":"crossref","unstructured":"Lee, L., Grimson, W.E.L.: Gait analysis for recognition and classification. In: Proceedings Fifth IEEE International Conference on Automatic Face and Gesture Recognition, pp. 148\u2013155. IEEE (2002)","DOI":"10.1109\/AFGR.2002.1004148"},{"key":"32_CR21","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"1090","DOI":"10.1007\/11527923_113","volume-title":"Audio- and Video-Based Biometric Person Authentication","author":"DP Lopresti","year":"2005","unstructured":"Lopresti, D.P., Raim, J.D.: The effectiveness of generative attacks on an online handwriting biometric. In: Kanade, T., Jain, A., Ratha, N.K. (eds.) AVBPA 2005. LNCS, vol. 3546, pp. 1090\u20131099. Springer, Heidelberg (2005)"},{"key":"32_CR22","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"195","DOI":"10.1007\/978-3-642-39188-0_21","volume-title":"Universal Access in Human-Computer Interaction","author":"LM Mayron","year":"2013","unstructured":"Mayron, L.M., Hausawi, Y., Bahr, G.S.: Secure, usable biometric authentication systems. In: Stephanidis, C., Antona, M. (eds.) UAHCI 2013, Part I. LNCS, vol. 8009, pp. 195\u2013204. Springer, Heidelberg (2013)"},{"issue":"4","key":"32_CR23","doi-asserted-by":"publisher","first-page":"351","DOI":"10.1016\/S0167-739X(99)00059-X","volume":"16","author":"F Monrose","year":"2000","unstructured":"Monrose, F., Rubin, A.D.: Keystroke dynamics as a biometric for authentication. Future Gener. Comput. Syst. 16(4), 351\u2013359 (2000)","journal-title":"Future Gener. Comput. Syst."},{"key":"32_CR24","volume-title":"Security in Computing","author":"C Pfleeger","year":"2006","unstructured":"Pfleeger, C., Pfleeger, S.: Security in Computing. Prentice Hall PTR, Englewood Cliffs (2006)"},{"key":"32_CR25","doi-asserted-by":"crossref","unstructured":"Reynolds, D.A.: An overview of automatic speaker recognition. In: Proceedings of the International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. S.4072\u2013S.4075 (2002)","DOI":"10.1109\/ICASSP.2002.1004813"},{"key":"32_CR26","unstructured":"Sasse, M.: Computer security: anatomy of a usability disaster, and a plan for recovery. In: Proceedings of CHI 2003 Workshop on HCI and Security Systems. Citeseer (2003)"},{"issue":"3","key":"32_CR27","doi-asserted-by":"publisher","first-page":"122","DOI":"10.1023\/A:1011902718709","volume":"19","author":"M Sasse","year":"2001","unstructured":"Sasse, M., Brostoff, S., Weirich, D.: Transforming the weakest linka human\/computer interaction approach to usable and effective security. BT Technol. J. 19(3), 122\u2013131 (2001)","journal-title":"BT Technol. J."},{"issue":"4","key":"32_CR28","doi-asserted-by":"publisher","first-page":"136","DOI":"10.1145\/1053291.1053327","volume":"48","author":"B Schneier","year":"2005","unstructured":"Schneier, B.: Two-factor authentication: too little, too late. Commun. ACM 48(4), 136 (2005)","journal-title":"Commun. ACM"},{"key":"32_CR29","doi-asserted-by":"publisher","DOI":"10.1201\/9781420064995","volume-title":"The Universal Access Handbook","author":"C Stephanidis","year":"2009","unstructured":"Stephanidis, C.: The Universal Access Handbook. CRC Press, Boca Raton (2009)"},{"issue":"5","key":"32_CR30","doi-asserted-by":"publisher","first-page":"1101","DOI":"10.1016\/j.intcom.2006.01.004","volume":"18","author":"D Toledano","year":"2006","unstructured":"Toledano, D., Fern\u00e1ndez Pozo, R., Hern\u00e1ndez Trapote, \u00c1., Hern\u00e1ndez G\u00f3mez, L.: Usability evaluation of multi-modal biometric verification systems. Interact. Comput. 18(5), 1101\u20131122 (2006)","journal-title":"Interact. Comput."},{"key":"32_CR31","doi-asserted-by":"crossref","unstructured":"Vielhauer, C., Steinmetz, R., Mayerhofer, A.: Biometric hash based on statistical features of online signatures. In: Proceedings of 16th International Conference on Pattern Recognition, vol. 1, pp. 123\u2013126. IEEE (2002)","DOI":"10.1109\/ICPR.2002.1044628"},{"issue":"5895","key":"32_CR32","doi-asserted-by":"publisher","first-page":"1465","DOI":"10.1126\/science.1160379","volume":"321","author":"L Ahn Von","year":"2008","unstructured":"Von Ahn, L., Maurer, B., McMillen, C., Abraham, D., Blum, M.: reCAPTCHA: Human-based character recognition via web security measures. Science 321(5895), 1465\u20131468 (2008)","journal-title":"Science"},{"issue":"12","key":"32_CR33","doi-asserted-by":"publisher","first-page":"1505","DOI":"10.1109\/TPAMI.2003.1251144","volume":"25","author":"L Wang","year":"2003","unstructured":"Wang, L., Tan, T., Ning, H., Hu, W.: Silhouette analysis-based gait recognition for human identification. IEEE Trans. Pattern Analy. Mach. Intell. 25(12), 1505\u20131518 (2003)","journal-title":"IEEE Trans. Pattern Analy. Mach. Intell."},{"key":"32_CR34","doi-asserted-by":"crossref","unstructured":"Yampolskiy, R.V.: Mimicry attack on strategy-based behavioral biometric. In: Fifth International Conference on Information Technology: New Generations, ITNG 2008, pp. 916\u2013921. IEEE (2008)","DOI":"10.1109\/ITNG.2008.78"},{"issue":"1","key":"32_CR35","doi-asserted-by":"publisher","first-page":"81","DOI":"10.1504\/IJBM.2008.018665","volume":"1","author":"RV Yampolskiy","year":"2008","unstructured":"Yampolskiy, R.V., Govindaraju, V.: Behavioural biometrics: a survey and classification. Int. J. Biom. 1(1), 81\u2013113 (2008)","journal-title":"Int. J. Biom."},{"key":"32_CR36","doi-asserted-by":"publisher","first-page":"25","DOI":"10.1109\/MSP.2004.81","volume":"5","author":"J Yan","year":"2004","unstructured":"Yan, J., et al.: Password memorability and security: empirical results. IEEE Secur. Priv. 5, 25\u201331 (2004)","journal-title":"IEEE Secur. Priv."}],"container-title":["Lecture Notes in Computer Science","Universal Access in Human-Computer Interaction. Access to Today's Technologies"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-20678-3_32","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,5,29]],"date-time":"2025-05-29T09:55:32Z","timestamp":1748512532000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-20678-3_32"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015]]},"ISBN":["9783319206776","9783319206783"],"references-count":36,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-20678-3_32","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2015]]},"assertion":[{"value":"18 July 2015","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}}]}}