{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,5,30]],"date-time":"2025-05-30T15:40:03Z","timestamp":1748619603650,"version":"3.41.0"},"publisher-location":"Cham","reference-count":16,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319243689"},{"type":"electronic","value":"9783319243696"}],"license":[{"start":{"date-parts":[[2015,1,1]],"date-time":"2015-01-01T00:00:00Z","timestamp":1420070400000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2015]]},"DOI":"10.1007\/978-3-319-24369-6_18","type":"book-chapter","created":{"date-parts":[[2015,9,10]],"date-time":"2015-09-10T22:46:37Z","timestamp":1441925197000},"page":"219-230","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["U-Stroke Pattern Modeling for End User Identity Verification Through Ubiquitous Input Device"],"prefix":"10.1007","author":[{"given":"Tapalina","family":"Bhattasali","sequence":"first","affiliation":[]},{"given":"Nabendu","family":"Chaki","sequence":"additional","affiliation":[]},{"given":"Khalid","family":"Saeed","sequence":"additional","affiliation":[]},{"given":"Rituparna","family":"Chaki","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2015,10,30]]},"reference":[{"issue":"1","key":"18_CR1","doi-asserted-by":"publisher","first-page":"70","DOI":"10.1109\/MPRV.2006.18","volume":"5","author":"R Ballagas","year":"2006","unstructured":"Ballagas, R., Borchers, J., Rohs, M., Sheridan, J.G.: The smart phone: a ubiquitous input device. IEEE Journal of Pervasive Computing 5(1), 70\u201377 (2006)","journal-title":"IEEE Journal of Pervasive Computing"},{"key":"18_CR2","first-page":"131","volume":"23","author":"T Bhattasali","year":"2014","unstructured":"Bhattasali, T., Saeed, K., Chaki, N., Chaki, R.: Bio-authentication for layered remote health monitor framework. Journal of Medical Informatics & Technologies 23, 131\u2013140 (2014)","journal-title":"Journal of Medical Informatics & Technologies"},{"doi-asserted-by":"crossref","unstructured":"Maxion, R., Killourhy, K.: Keystroke biometrics with number-pad input. In: Proceedings of IEEE International Conference on Dependable Systems & Networks, pp. 201\u2013210 (2010)","key":"18_CR3","DOI":"10.1109\/DSN.2010.5544311"},{"unstructured":"Xu, H., Zhou, Y., Lyu, M.R.: Towards continuous and passive authentication via touch biometrics: an experimental study on smartphones. In: Proceedings of Symposium on Usable Privacy and Security, pp. 187\u2013198 (2014)","key":"18_CR4"},{"doi-asserted-by":"crossref","unstructured":"Shahzad, M., Liu, A.X., Samuel, A.: Secure unlocking of mobile touch screen devices by simple gestures \u2013 you can see it but you cannot do it. In: Proceedings of International Conference on Mobile Computing and Networking, pp. 39\u201350 (2013)","key":"18_CR5","DOI":"10.1145\/2500423.2500434"},{"doi-asserted-by":"crossref","unstructured":"Feng, T., Liu, Z., Kwon, K.-A., Shi, W., Carbunar, B., Jiang, Y., Nguyen, N.: Continuous mobile authentication using touchscreen gestures. In: Proceedings of IEEE International Conference on Biometrics: Theory, Applications and Systems, pp. 451\u2013456 (2013)","key":"18_CR6","DOI":"10.1109\/THS.2012.6459891"},{"doi-asserted-by":"crossref","unstructured":"Xu, Z., Bai, K., Zhu, S.: TapLogger: inferring user inputs on smartphonetouchscreens using on-board motion sensors. In: Proceedings of International conference on Security and Privacy in Wireless and Mobile Networks, pp. 113\u2013124. ACM (2012)","key":"18_CR7","DOI":"10.1145\/2185448.2185465"},{"issue":"1","key":"18_CR8","doi-asserted-by":"publisher","first-page":"136","DOI":"10.1109\/TIFS.2012.2225048","volume":"8","author":"M Frank","year":"2013","unstructured":"Frank, M., Biedert, R., Ma, E., Martinovic, I., Song, D.: Touchalytics: On the Applicability of Touchscreen Input as a Behavioral Biometric for Continuous Authentication. IEEE Transactions on Information Forensics and Security 8(1), 136\u2013148 (2013)","journal-title":"IEEE Transactions on Information Forensics and Security"},{"doi-asserted-by":"crossref","unstructured":"Luca, A.D., Hang, A., Brudy, F., Lindner, C., Hussmann, H.: Touch me once and i know it\u2019s you! Implicit authentication based on touch screen patterns. In: Proceedings of the SIGCHI Conference on Human Factors in Computing Systems, pp. 987\u2013996. ACM (2012)","key":"18_CR9","DOI":"10.1145\/2207676.2208544"},{"unstructured":"Touch Screen. http:\/\/inventors.about.com\/library\/inventors\/bltouch.htm","key":"18_CR10"},{"doi-asserted-by":"crossref","unstructured":"Bi, X., Li, Y., Zhai, S.: FFitts law: modeling finger touch with fitts\u2019 law. In: Proceedings of SIGCHI Conference on Human Factors in Computing Systems, pp. 1363\u20131372. ACM (2013)","key":"18_CR11","DOI":"10.1145\/2470654.2466180"},{"key":"18_CR12","doi-asserted-by":"publisher","first-page":"3","DOI":"10.1016\/0001-6918(69)90034-1","volume":"30","author":"AT Welford","year":"1969","unstructured":"Welford, A.T., Norris, A.H., Shock, N.W.: Speed and Accuracy of Movement And Their Changes with Age. Elsevier Journal Acta Psychologica. 30, 3\u201315 (1969)","journal-title":"Elsevier Journal Acta Psychologica."},{"key":"18_CR13","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"331","DOI":"10.1007\/978-3-540-87403-4_18","volume-title":"Recent Advances in Intrusion Detection","author":"KS Killourhy","year":"2008","unstructured":"Killourhy, K.S., Maxion, R.A.: The effect of clock resolution on keystroke dynamics. In: Lippmann, R., Kirda, E., Trachtenberg, A. (eds.) RAID 2008. LNCS, vol. 5230, pp. 331\u2013350. Springer, Heidelberg (2008)"},{"unstructured":"Rogers, R.: Android Application Development. O\u2019Reilly (2009)","key":"18_CR14"},{"doi-asserted-by":"crossref","unstructured":"Zheng, N., Baiy, K., Huangy, H., Wang, H.: You are how you touch: user verification on smartphones via tapping behaviors. In: Proceedings of IEEE International Conference on Network Protocols (ICNP), pp. 221\u2013232 (2014)","key":"18_CR15","DOI":"10.1109\/ICNP.2014.43"},{"doi-asserted-by":"crossref","unstructured":"Bo, C., Zhang, L., Li, X.Y., Huang, Q., Wang, Y.: SilentSense: silent user identification via touch and movement behavioral biometrics. In: Proceedings of Annual International Conference on Mobile Computing & Networking (MobiCom), pp. 187\u2013190 (2013)","key":"18_CR16","DOI":"10.1145\/2500423.2504572"}],"container-title":["Lecture Notes in Computer Science","Computer Information Systems and Industrial Management"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-24369-6_18","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,5,30]],"date-time":"2025-05-30T15:09:04Z","timestamp":1748617744000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-24369-6_18"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015]]},"ISBN":["9783319243689","9783319243696"],"references-count":16,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-24369-6_18","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2015]]},"assertion":[{"value":"30 October 2015","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}}]}}