{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,9,28]],"date-time":"2025-09-28T20:26:36Z","timestamp":1759091196413,"version":"3.41.0"},"publisher-location":"Cham","reference-count":15,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319208039"},{"type":"electronic","value":"9783319208046"}],"license":[{"start":{"date-parts":[[2015,1,1]],"date-time":"2015-01-01T00:00:00Z","timestamp":1420070400000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2015]]},"DOI":"10.1007\/978-3-319-20804-6_18","type":"book-chapter","created":{"date-parts":[[2015,7,21]],"date-time":"2015-07-21T10:28:20Z","timestamp":1437474500000},"page":"188-200","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":3,"title":["Smart Kiosk with Gait-Based Continuous Authentication"],"prefix":"10.1007","author":[{"given":"Duong-Tien","family":"Phan","sequence":"first","affiliation":[]},{"given":"Nhan Nguyen-Trong","family":"Dam","sequence":"additional","affiliation":[]},{"given":"Minh-Phuc","family":"Nguyen","sequence":"additional","affiliation":[]},{"given":"Minh-Triet","family":"Tran","sequence":"additional","affiliation":[]},{"given":"Toan-Thinh","family":"Truong","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2015,7,22]]},"reference":[{"issue":"11","key":"18_CR1","doi-asserted-by":"publisher","first-page":"770","DOI":"10.1145\/358790.358797","volume":"24","author":"L Lamport","year":"1981","unstructured":"Lamport, L.: Password authentication with insecure communication. Commun. ACM 24(11), 770\u2013772 (1981)","journal-title":"Commun. ACM"},{"issue":"5","key":"18_CR2","doi-asserted-by":"publisher","first-page":"1683","DOI":"10.1109\/TIE.2006.881998","volume":"53","author":"CC Lee","year":"2006","unstructured":"Lee, C.C., Hwang, M.S., Liao, I.E.: Security enhancement on a new authentication scheme with anonymity for wireless environments. IEEE Trans. Industr. Electron. 53(5), 1683\u20131686 (2006)","journal-title":"IEEE Trans. Industr. Electron."},{"issue":"7","key":"18_CR3","doi-asserted-by":"publisher","first-page":"1160","DOI":"10.1016\/j.jcss.2008.04.002","volume":"74","author":"G Yang","year":"2008","unstructured":"Yang, G., Wong, D.S., Wang, H., Deng, X.: Two-factor mutual authentication based on smart cards and passwords. J. Comput. Syst. Sci. 74(7), 1160\u20131172 (2008)","journal-title":"J. Comput. Syst. Sci."},{"issue":"519723","key":"18_CR4","first-page":"6","volume":"2012","author":"Y An","year":"2012","unstructured":"An, Y.: Security analysis and enhancements of an effective biometric-based remote user authentication scheme using smart cards. J. Biomed. Biotechnol. 2012(519723), 6 (2012)","journal-title":"J. Biomed. Biotechnol."},{"issue":"491289","key":"18_CR5","first-page":"9","volume":"2013","author":"MK Khan","year":"2013","unstructured":"Khan, M.K., Kumari, S.: (An improved biometrics-based remote user authentication scheme with user anonymity. J. Biomed. Biotechnol. 2013(491289), 9 (2013)","journal-title":"J. Biomed. Biotechnol."},{"key":"18_CR6","first-page":"110","volume":"2014","author":"M Sarvabhatla","year":"2014","unstructured":"Sarvabhatla, M., Giri, M., Vorugunti, C.S.: A secure biometrics-based remote user authentication scheme for secure data exchange. Embed. Syst. 2014, 110\u2013115 (2014)","journal-title":"Embed. Syst."},{"issue":"4","key":"18_CR7","doi-asserted-by":"publisher","first-page":"1747","DOI":"10.1007\/s11277-014-2111-6","volume":"80","author":"F Wen","year":"2014","unstructured":"Wen, F., Susilo, W., Yang, G.: Analysis and improvement on a biometric-based remote user authentication scheme using smart cards. J. Wireless Pers. Commun. 80(4), 1747\u20131760 (2014)","journal-title":"J. Wireless Pers. Commun."},{"issue":"4","key":"18_CR8","doi-asserted-by":"publisher","first-page":"933","DOI":"10.1109\/TIFS.2009.2031942","volume":"4","author":"CI Fan","year":"2009","unstructured":"Fan, C.I., Lin, Y.H.: Provably secure remote truly three-factor authentication scheme with privacy protection on biometrics. IEEE Trans. Inf. Forensics Secur. 4(4), 933\u2013945 (2009)","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"key":"18_CR9","doi-asserted-by":"crossref","unstructured":"Thinh, T-T., Tran, M-T., Duong, A-D.: Robust mobile device integration of a fingerprint biometric remote authentication scheme. In: 26th IEEE International Conference on Advanced Information Networking and Applications (AINA 2012), pp. 678\u2013685 (2012)","DOI":"10.1109\/AINA.2012.47"},{"key":"18_CR10","doi-asserted-by":"crossref","unstructured":"Thinh, T-T., Tran, M-T., Duong, A-D.: Robust secure dynamic ID based remote user authentication scheme for multi-server environment. In: 13th International Conference on Computational Science and Its Applications (ICCSA 2013). LNCS, vol. 7975, pp. 502\u2013515 (2013)","DOI":"10.1007\/978-3-642-39640-3_37"},{"issue":"22","key":"18_CR11","doi-asserted-by":"publisher","first-page":"1116","DOI":"10.1049\/el.2009.2301","volume":"45","author":"G Pan","year":"2009","unstructured":"Pan, G., Zhang, Y., Wu, Z.: Accelerometer-based gait recognition via voting by signature points. IET Electron. Lett. 45(22), 1116\u20131118 (2009)","journal-title":"IET Electron. Lett."},{"key":"18_CR12","doi-asserted-by":"crossref","unstructured":"Frank, F., Mannor, S., Precup, D.: Activity and gait recognition with time-delay embeddings. In: The 24th AAAI Conference on Artificial Intelligence 2010, pp. 1581\u20131586 (2010)","DOI":"10.1609\/aaai.v24i1.7724"},{"key":"18_CR13","doi-asserted-by":"crossref","unstructured":"Dandachi, G., Hassan, B.E., Hussein, A.E.: A novel identification\/verification model using smartphone\u2019s sensors and user behavior. In: 2nd International Conference on Advances in Biomedical Engineering (ICABME 2013), pp. 235\u2013238 (2013)","DOI":"10.1109\/ICABME.2013.6648891"},{"issue":"10","key":"18_CR14","doi-asserted-by":"publisher","first-page":"29","DOI":"10.1109\/MAES.2013.6642829","volume":"28","author":"C Nickel","year":"2013","unstructured":"Nickel, C., Busch, C.: Classifying accelerometer data via hidden Markov models to authenticate people by the way they walk. IEEE Aerosp. Electron. Syst. Mag. 28(10), 29\u201335 (2013)","journal-title":"IEEE Aerosp. Electron. Syst. Mag."},{"key":"18_CR15","doi-asserted-by":"crossref","unstructured":"Hoang, T., Choi, D., Vo, V., Nguyen, A., Nguyen, T.: A lightweight gait authentication on mobile phone regardless of installation error. In: The 28th IFIP TC 11 International Conference (SEC 2013), pp. 83\u2013101 (2013)","DOI":"10.1007\/978-3-642-39218-4_7"}],"container-title":["Lecture Notes in Computer Science","Distributed, Ambient, and Pervasive Interactions"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-20804-6_18","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,5,29]],"date-time":"2025-05-29T13:55:05Z","timestamp":1748526905000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-20804-6_18"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015]]},"ISBN":["9783319208039","9783319208046"],"references-count":15,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-20804-6_18","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2015]]},"assertion":[{"value":"22 July 2015","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}}]}}