{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,25]],"date-time":"2025-03-25T19:24:46Z","timestamp":1742930686062,"version":"3.40.3"},"publisher-location":"Cham","reference-count":24,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319232751"},{"type":"electronic","value":"9783319232768"}],"license":[{"start":{"date-parts":[[2015,1,1]],"date-time":"2015-01-01T00:00:00Z","timestamp":1420070400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2015,1,1]],"date-time":"2015-01-01T00:00:00Z","timestamp":1420070400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2015]]},"DOI":"10.1007\/978-3-319-23276-8_31","type":"book-chapter","created":{"date-parts":[[2015,9,3]],"date-time":"2015-09-03T08:51:07Z","timestamp":1441270267000},"page":"348-359","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["Behavioural Biometrics: Utilizing Eye-Tracking to Generate a Behavioural Pin Using the Eyewriter"],"prefix":"10.1007","author":[{"given":"Bobby L.","family":"Tait","sequence":"first","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2015,9,4]]},"reference":[{"key":"31_CR1","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"780","DOI":"10.1007\/11499145_79","volume-title":"Image Analysis","author":"R Bednarik","year":"2005","unstructured":"Bednarik, R., Kinnunen, T., Mihaila, A., Fr\u00e4nti, P.: Eye-movements as a biometric. In: Kalviainen, H., Parkkinen, J., Kaarna, A. (eds.) SCIA 2005. LNCS, vol. 3540, pp. 780\u2013789. Springer, Heidelberg (2005)"},{"issue":"4","key":"31_CR2","doi-asserted-by":"publisher","first-page":"367","DOI":"10.1145\/581271.581272","volume":"5","author":"F Bergadano","year":"2002","unstructured":"Bergadano, F., Gunetti, D., Picardi, C.: User authentication through keystroke dynamics. ACM Trans. Inf. Syst. Secur. (TISSEC) 5(4), 367\u2013397 (2002)","journal-title":"ACM Trans. Inf. Syst. Secur. (TISSEC)"},{"issue":"2","key":"31_CR3","doi-asserted-by":"publisher","first-page":"72","DOI":"10.1109\/MPRV.2010.30","volume":"9","author":"A Bellucci","year":"2010","unstructured":"Bellucci, A., Malizia, A., Diaz, P., Aedo, I.: Human-display interaction technology: emerging remote interfaces for pervasive display environments. IEEE Pervasive Comput. 9(2), 72\u201376 (2010)","journal-title":"IEEE Pervasive Comput."},{"issue":"3","key":"31_CR4","first-page":"13","volume":"2","author":"D Bhattacharyya","year":"2009","unstructured":"Bhattacharyya, D., Ranjan, R., Alisherov, F., Choi, M.: Biometric authentication: a review. Int. J. u-and e-Serv. Sci. Technol. 2(3), 13\u201328 (2009)","journal-title":"Int. J. u-and e-Serv. Sci. Technol."},{"issue":"4","key":"31_CR5","doi-asserted-by":"publisher","first-page":"619","DOI":"10.1109\/TPAMI.2005.70","volume":"27","author":"KI Chang","year":"2005","unstructured":"Chang, K.I., Bowyer, K.W., Flynn, P.J.: An evaluation of multimodal 2D\u00a0+\u00a03D face biometrics. IEEE Trans. Pattern Anal. Mach. Intell. 27(4), 619\u2013624 (2005)","journal-title":"IEEE Trans. Pattern Anal. Mach. Intell."},{"key":"31_CR6","series-title":"IFIP \u2014 The International Federation for Information Processing","first-page":"275","volume-title":"Security and Protection in Information Processing Systems","author":"PS Dowland","year":"2014","unstructured":"Dowland, P.S., Furnell, S.M.: A long-term trial of keystroke profiling using digraph, trigraph and keyword latencies. In: Deswarte, Y., Cuppens, F., Jajodia, S., Wang, L. (eds.) IFIP WG. IFIP, vol. 147, pp. 275\u2013289. Springer, Heidelberg (2014)"},{"key":"31_CR7","unstructured":"EyeWriter: The EyeWriter (2015). www.eyewriter.org"},{"key":"31_CR8","unstructured":"EyeWriter 2.0 (2015). http:\/\/www.instructables.com\/id\/The-EyeWriter-20\/"},{"key":"31_CR9","unstructured":"EyeWriter code, Eye Writer Application Code (2014). https:\/\/github.com\/eyewriter\/eyewriter-1.0"},{"key":"31_CR10","doi-asserted-by":"crossref","unstructured":"Gamboa, H., Fred, A.: A behavioral biometric system based on human-computer interaction. In: Defense and Security, pp. 381\u2013392. International Society for Optics and Photonics, August 2004","DOI":"10.1117\/12.542625"},{"issue":"9","key":"31_CR11","doi-asserted-by":"publisher","first-page":"1670","DOI":"10.1109\/TPAMI.2008.183","volume":"31","author":"Z He","year":"2009","unstructured":"He, Z., Tan, T., Sun, Z., Qiu, X.: Toward accurate and fast iris segmentation for iris biometrics. IEEE Trans. Pattern Anal. Mach. Intell. 31(9), 1670\u20131684 (2009)","journal-title":"IEEE Trans. Pattern Anal. Mach. Intell."},{"key":"31_CR12","unstructured":"Higgins, P.T.: Introduction to biometrics. In: The Proceeding of Biometrics Consortium Conference (2006)"},{"issue":"4","key":"31_CR13","doi-asserted-by":"publisher","first-page":"1790","DOI":"10.1109\/TCE.2008.4711236","volume":"54","author":"DJ Kim","year":"2008","unstructured":"Kim, D.J., Hong, K.S.: Multimodal biometric authentication using teeth image and voice in mobile environment. IEEE Trans. Consum. Electron. 54(4), 1790\u20131797 (2008)","journal-title":"IEEE Trans. Consum. Electron."},{"key":"31_CR14","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"668","DOI":"10.1007\/3-540-44887-X_78","volume-title":"Audio- and Video-Based Biometric Person Authentication","author":"A Kumar","year":"2003","unstructured":"Kumar, A., Wang, D.C., Shen, H.C., Jain, A.K.: Personal verification using palmprint and hand geometry biometric. In: Kittler, J., Nixon, M.S. (eds.) Audio- and Video-Based Biometric Person Authentication. LNCS, vol. 2688, pp. 668\u2013678. Springer, Heidelberg (2003)"},{"volume-title":"Advances in Fingerprint Technology","year":"2001","key":"31_CR15","unstructured":"Lee, H.C., Ramotowski, R., Gaensslen, R.E. (eds.): Advances in Fingerprint Technology. CRC Press, Boca Raton (2001)"},{"key":"31_CR16","unstructured":"M\u00e4ntyj\u00e4rvi, J., Lindholm, M., Vildjiounaite, E., M\u00e4kel\u00e4, S.M., Ailisto, H.A.: Identifying users of portable devices from gait pattern with accelerometers. In: IEEE International Conference on Acoustics, Speech, and Signal Processing, 2005, Proceedings (ICASSP 2005), vol. 2, pp. ii-973. IEEE, March, 2005"},{"issue":"2","key":"31_CR17","doi-asserted-by":"publisher","first-page":"22","DOI":"10.1109\/6.259484","volume":"31","author":"B Miller","year":"1994","unstructured":"Miller, B.: Vital signs of identity [biometrics]. IEEE Spectr. 31(2), 22\u201330 (1994)","journal-title":"IEEE Spectr."},{"key":"31_CR18","doi-asserted-by":"crossref","unstructured":"Monrose, F., & Rubin, A. (1997, April). Authentication via keystroke dynamics. In\u00a0Proceedings of the 4th ACM conference on Computer and communications security\u00a0(pp. 48-56). ACM","DOI":"10.1145\/266420.266434"},{"key":"31_CR19","doi-asserted-by":"publisher","unstructured":"Shepherd, S.J.: Continuous authentication by analysis of keyboard typing characteristics. In: European Convention on Security and Detection, pp. 111\u2013114, 16\u201318 May 1995. doi:10.1049\/cp:19950480","DOI":"10.1049\/cp:19950480"},{"issue":"20","key":"31_CR20","doi-asserted-by":"publisher","first-page":"198","DOI":"10.1029\/2005EO200008","volume":"86","author":"DP Stern","year":"2005","unstructured":"Stern, D.P.: A Short history of nearly everything. Eos Trans. Am. Geophys. Union 86(20), 198 (2005)","journal-title":"Eos Trans. Am. Geophys. Union"},{"key":"31_CR21","first-page":"114","volume":"11","author":"L Thalheim","year":"2002","unstructured":"Thalheim, L., Krissler, J., Ziegler, P.M.: Body check. C\u2019t Mag. 11, 114 (2002)","journal-title":"C\u2019t Mag."},{"key":"31_CR22","doi-asserted-by":"publisher","first-page":"133","DOI":"10.1007\/978-1-84628-921-7_8","volume-title":"Advances in Biometrics","author":"D Usher","year":"2008","unstructured":"Usher, D., Tosa, Y., Friedman, M.: Ocular biometrics: simultaneous capture and analysis of the retina and iris. In: Ratha, N.K., Govindaraju, V. (eds.) Advances in Biometrics, pp. 133\u2013155. Springer, London (2008)"},{"key":"31_CR23","unstructured":"Tobii: Tobii eye tracking technologies (2015). www.tobii.com"},{"volume-title":"Behavioral Biometrics for Human Identification: Intelligent Applications: Intelligent Applications","year":"2009","key":"31_CR24","unstructured":"Wang, L. (ed.): Behavioral Biometrics for Human Identification: Intelligent Applications: Intelligent Applications. IGI Global, Hershey (2009)"}],"container-title":["Communications in Computer and Information Science","Global Security, Safety and Sustainability: Tomorrow's Challenges of Cyber Security"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-23276-8_31","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,2,10]],"date-time":"2023-02-10T11:41:09Z","timestamp":1676029269000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-319-23276-8_31"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015]]},"ISBN":["9783319232751","9783319232768"],"references-count":24,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-23276-8_31","relation":{},"ISSN":["1865-0929","1865-0937"],"issn-type":[{"type":"print","value":"1865-0929"},{"type":"electronic","value":"1865-0937"}],"subject":[],"published":{"date-parts":[[2015]]},"assertion":[{"value":"4 September 2015","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}}]}}