{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,26]],"date-time":"2025-03-26T23:30:32Z","timestamp":1743031832023,"version":"3.40.3"},"publisher-location":"Cham","reference-count":26,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319243689"},{"type":"electronic","value":"9783319243696"}],"license":[{"start":{"date-parts":[[2015,1,1]],"date-time":"2015-01-01T00:00:00Z","timestamp":1420070400000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2015]]},"DOI":"10.1007\/978-3-319-24369-6_16","type":"book-chapter","created":{"date-parts":[[2015,9,10]],"date-time":"2015-09-10T18:46:37Z","timestamp":1441910797000},"page":"193-203","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":10,"title":["Biometric Swiping on Touchscreens"],"prefix":"10.1007","author":[{"given":"Orcan","family":"Alpar","sequence":"first","affiliation":[]},{"given":"Ondrej","family":"Krejcar","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2015,10,30]]},"reference":[{"key":"16_CR1","unstructured":"Zheng, N., Bai, K., Huang, H., Wang, H.: You are how you touch: User verification on smartphones via tapping behaviors. Technical Report, College of William and Mary (2012)"},{"key":"16_CR2","doi-asserted-by":"crossref","unstructured":"Kwapisz, J., Weiss, G., Moore, S.: Cell phone-based biometric identification. In: Proceedings IEEE Int. Conf. on Biometrics: Theory Applications and Systems (2010)","DOI":"10.1109\/BTAS.2010.5634532"},{"issue":"5","key":"16_CR3","doi-asserted-by":"publisher","first-page":"1157","DOI":"10.1016\/j.jss.2011.12.044","volume":"85","author":"TY Chang","year":"2012","unstructured":"Chang, T.Y., Tsai, C.J., Lin, J.H.: A graphical-based password keystroke dynamic authentication system for touch screen handheld mobile devices. Journal of Systems and Software 85(5), 1157\u20131165 (2012)","journal-title":"Journal of Systems and Software"},{"key":"16_CR4","doi-asserted-by":"crossref","unstructured":"Sae-Bae, N., Ahmed, K., Isbister, K., Memon, N.: Biometric-rich gestures: a novel approach to authentication on multi-touch devices. In: CHI 2012 Proceedings of the 2012 ACM Annual Conference on Human Factors in Computing Systems, New York (2012)","DOI":"10.1145\/2207676.2208543"},{"key":"16_CR5","doi-asserted-by":"crossref","unstructured":"De Luca, A., Hang, A., Brudy, F., Lindner, C., Hussmann, H.: Touch me once and i know it\u2019s you!: implicit authentication based on touch screen patterns. In: CHI 2012 Proceedings of the 2012 ACM Annual Conference on Human Factors in Computing Systems, New York (2012)","DOI":"10.1145\/2207676.2208544"},{"key":"16_CR6","series-title":"IFIP Advances in Information and Communication Technology","doi-asserted-by":"publisher","first-page":"130","DOI":"10.1007\/978-3-642-31668-5_10","volume-title":"Privacy and Identity Management for Life","author":"J Angulo","year":"2012","unstructured":"Angulo, J., W\u00e4stlund, E.: Exploring touch-screen biometrics for user identification on smart phones. In: Camenisch, J., Crispo, B., Fischer-H\u00fcbner, S., Leenes, R., Russello, G. (eds.) Privacy and Identity Management for Life. IFIP AICT, vol. 375, pp. 130\u2013143. Springer, Heidelberg (2012)"},{"key":"16_CR7","doi-asserted-by":"crossref","unstructured":"Shahzad, M., Liu, A.X., Samuel, A.: Secure unlocking of mobile touch screen devices by simple gestures: you can see it but you can not do it. In: Proceedings of the 19th Annual International Conference on Mobile Computing & Networking. ACM (2013)","DOI":"10.1145\/2500423.2500434"},{"key":"16_CR8","doi-asserted-by":"crossref","unstructured":"Schaub, F., Deyhle, R., Weber, M.: Password entry usability and shoulder surfing susceptibility on different smartphone platforms. In: Proceedings of Mobile & Ubiquitous Multimedia (2012)","DOI":"10.1145\/2406367.2406384"},{"key":"16_CR9","doi-asserted-by":"crossref","unstructured":"Shahzad, M., Zahid, S., Farooq, M.: A hybrid GA-PSO fuzzy system for user identification on smart phones. In: ACM, Proceedings of the 11th Annual Conference on Genetic and Evolutionary Computation, pp. 1617\u20131624 (2009)","DOI":"10.1145\/1569901.1570117"},{"key":"16_CR10","doi-asserted-by":"crossref","unstructured":"Maiorana, E., Campisi, P., Gonz\u00e1lez-Carballo, N., Neri, A.: Keystroke dynamics authentication for mobile phones. In: Proceedings of the 2011 ACM Symposium on Applied Computing, pp. 21\u201326. ACM (2011)","DOI":"10.1145\/1982185.1982190"},{"issue":"18","key":"16_CR11","first-page":"4917","volume":"9","author":"MK Rao","year":"2014","unstructured":"Rao, M.K., Aparna, P., Akash, G.A., Mounica, K.: A Graphical Password Authentication System for Touch Screen Based Devices. International Journal of Applied Engineering Research 9(18), 4917\u20134924 (2014)","journal-title":"International Journal of Applied Engineering Research"},{"key":"16_CR12","doi-asserted-by":"crossref","unstructured":"Jeanjaitrong, N., Bhattarakosol, P.: Feasibility study on authentication based keystroke dynamic over touch-screen devices. In: 2013 13th International Symposium on Communications and Information Technologies (ISCIT), pp. 238\u2013242. IEEE (2013)","DOI":"10.1109\/ISCIT.2013.6645856"},{"issue":"8","key":"16_CR13","first-page":"968","volume":"17","author":"S Do","year":"2014","unstructured":"Do, S., Hoang, T., Luong, C., Choi, S., Lee, D., Bang, K., Choi, D.: Using Keystroke Dynamics for Implicit Authentication on Smartphone. \uba40\ud2f0\ubbf8\ub514\uc5b4\ud559\ud68c\ub17c\ubb38\uc9c0 17(8), 968\u2013976 (2014)","journal-title":"\uba40\ud2f0\ubbf8\ub514\uc5b4\ud559\ud68c\ub17c\ubb38\uc9c0"},{"key":"16_CR14","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"197","DOI":"10.1007\/978-3-642-40779-6_17","volume-title":"Communications and Multimedia Security","author":"M Trojahn","year":"2013","unstructured":"Trojahn, M., Arndt, F., Ortmeier, F.: Authentication with time features for keystroke dynamics on touchscreens. In: De Decker, B., Dittmann, J., Kraetzer, C., Vielhauer, C. (eds.) CMS 2013. LNCS, vol. 8099, pp. 197\u2013199. Springer, Heidelberg (2013)"},{"key":"16_CR15","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"47","DOI":"10.1007\/978-3-642-40925-7_5","volume-title":"Computer Information Systems and Industrial Management","author":"M Rogowski","year":"2013","unstructured":"Rogowski, M., Saeed, K., Rybnik, M., Tabedzki, M., Adamski, M.: User authentication for mobile devices. In: Saeed, K., Chaki, R., Cortesi, A., Wierzcho\u0144, S. (eds.) CISIM 2013. LNCS, vol. 8104, pp. 47\u201358. Springer, Heidelberg (2013)"},{"key":"16_CR16","doi-asserted-by":"crossref","unstructured":"Bours, P., Masoudian, E.: Applying keystroke dynamics on one-time pin codes. In: 2014 International Workshop on Biometrics and Forensics (IWBF), pp. 1\u20136. IEEE (2014)","DOI":"10.1109\/IWBF.2014.6914254"},{"issue":"1","key":"16_CR17","doi-asserted-by":"publisher","first-page":"136","DOI":"10.1109\/TIFS.2012.2225048","volume":"8","author":"M Frank","year":"2013","unstructured":"Frank, M., Biedert, R., Ma, E., Martinovic, I., Song, D.: Touchalytics: On the applicability of touchscreen input as a behavioral biometric for continuous authentication. IEEE Transactions on Information Forensics and Security 8(1), 136\u2013148 (2013)","journal-title":"IEEE Transactions on Information Forensics and Security"},{"issue":"4","key":"16_CR18","doi-asserted-by":"publisher","first-page":"568","DOI":"10.1109\/TIFS.2014.2302582","volume":"9","author":"N Sae-Bae","year":"2014","unstructured":"Sae-Bae, N., Memon, N., Isbister, K., Ahmed, K.: Multitouch Gesture-Based Authentication. IEEE Transactions on Information Forensics and Security 9(4), 568\u2013582 (2014)","journal-title":"IEEE Transactions on Information Forensics and Security"},{"issue":"11","key":"16_CR19","doi-asserted-by":"publisher","first-page":"1780","DOI":"10.1109\/TIFS.2014.2350916","volume":"9","author":"X Zhao","year":"2014","unstructured":"Zhao, X., Feng, T., Shi, W., Kakadiaris, I.: Mobile User Authentication Using Statistical Touch Dynamics Images. IEEE Transactions on Information Forensics and Security 9(11), 1780\u20131789 (2014)","journal-title":"IEEE Transactions on Information Forensics and Security"},{"key":"16_CR20","doi-asserted-by":"publisher","first-page":"213","DOI":"10.1016\/j.engappai.2013.11.009","volume":"32","author":"O Alpar","year":"2014","unstructured":"Alpar, O.: Keystroke recognition in user authentication using ANN based RGB histogram technique. Engineering Applications of Artificial Intelligence 32, 213\u2013217 (2014)","journal-title":"Engineering Applications of Artificial Intelligence"},{"issue":"4","key":"16_CR21","doi-asserted-by":"publisher","first-page":"333","DOI":"10.1049\/iet-spr.2008.0171","volume":"3","author":"P Campisi","year":"2009","unstructured":"Campisi, P., Maiorana, E., Bosco, M.L., Neri, A.: User Authentication Using Keystroke Dynamics for Cellular Phones. IET Signal Processing - Special Issue on Biometric Recognition 3(4), 333\u2013341 (2009)","journal-title":"IET Signal Processing - Special Issue on Biometric Recognition"},{"issue":"4","key":"16_CR22","doi-asserted-by":"publisher","first-page":"750","DOI":"10.1002\/sec.776","volume":"7","author":"CJ Tasia","year":"2014","unstructured":"Tasia, C.J., Chang, T.Y., Cheng, P.C., Lin, J.H.: Two novel biometric features in keystroke dynamics authentication systems for touch screen devices. Security and Communication Networks 7(4), 750\u2013758 (2014)","journal-title":"Security and Communication Networks"},{"key":"16_CR23","doi-asserted-by":"crossref","unstructured":"Kang, P., Cho, S.: Keystroke dynamics-based user authentication using long and free text strings from various input devices. Information Sciences (2014). \n                      http:\/\/dx.doi.org\/10.1016\/j.ins.2014.08.070","DOI":"10.1016\/j.ins.2014.08.070"},{"key":"16_CR24","doi-asserted-by":"publisher","unstructured":"Kambourakis, G., Damopoulos, D., Papamartzivanos, D., Pavlidakis, E.: Introducing touchstroke: keystroke\u2010based authentication system for smartphones. Security and Communication Networks (2014). doi:\n                      10.1002\/sec.1061","DOI":"10.1002\/sec.1061"},{"key":"16_CR25","doi-asserted-by":"crossref","first-page":"164","DOI":"10.1090\/qam\/10666","volume":"2","author":"K Levenberg","year":"1944","unstructured":"Levenberg, K.: A method for the solution of certain problems in least squares. Quarterly of Applied Mathematics 2, 164\u2013168 (1944)","journal-title":"Quarterly of Applied Mathematics"},{"issue":"2","key":"16_CR26","doi-asserted-by":"publisher","first-page":"431","DOI":"10.1137\/0111030","volume":"11","author":"DW Marquardt","year":"1963","unstructured":"Marquardt, D.W.: An algorithm for least-squares estimation of nonlinear parameters. Journal of the Society for Industrial & Applied Mathematics 11(2), 431\u2013441 (1963)","journal-title":"Journal of the Society for Industrial & Applied Mathematics"}],"container-title":["Lecture Notes in Computer Science","Computer Information Systems and Industrial Management"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-24369-6_16","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,9,16]],"date-time":"2019-09-16T20:05:32Z","timestamp":1568664332000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-24369-6_16"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015]]},"ISBN":["9783319243689","9783319243696"],"references-count":26,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-24369-6_16","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2015]]},"assertion":[{"value":"30 October 2015","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}}]}}