{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,1]],"date-time":"2025-06-01T07:10:10Z","timestamp":1748761810218,"version":"3.41.0"},"publisher-location":"Cham","reference-count":24,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319288642"},{"type":"electronic","value":"9783319288659"}],"license":[{"start":{"date-parts":[[2015,1,1]],"date-time":"2015-01-01T00:00:00Z","timestamp":1420070400000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2015]]},"DOI":"10.1007\/978-3-319-28865-9_26","type":"book-chapter","created":{"date-parts":[[2016,1,23]],"date-time":"2016-01-23T08:40:02Z","timestamp":1453538402000},"page":"477-499","source":"Crossref","is-referenced-by-count":4,"title":["How to Prevent to Delegate Authentication"],"prefix":"10.1007","author":[{"given":"Mohsen","family":"Alimomeni","sequence":"first","affiliation":[]},{"given":"Reihaneh","family":"Safavi-Naini","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"26_CR1","doi-asserted-by":"crossref","unstructured":"Alayed, H., Frangoudes, F., Neuman, C.: Behavioral-based cheating detection in online first person shooters using machine learning techniques. In: 2013 IEEE Conference on Computational Intelligence in Games (CIG), pp. 1\u20138, August 2013","DOI":"10.1109\/CIG.2013.6633617"},{"key":"26_CR2","unstructured":"Barker, E., Kelsey, J.: Recommendation for the entropy sources used for random bit generation, August 2012. http:\/\/csrc.nist.gov\/publications\/drafts\/800-90\/draft-sp800-90b.pdf"},{"key":"26_CR3","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"123","DOI":"10.1007\/978-3-540-73547-2_15","volume-title":"Autonomic and Trusted Computing","author":"S Balfe","year":"2007","unstructured":"Balfe, S., Mohammed, A.: Final fantasy \u2013 securing on-line gaming with trusted computing. In: Xiao, B., Yang, L.T., Ma, J., Muller-Schloer, C., Hua, Y. (eds.) ATC 2007. LNCS, vol. 4610, pp. 123\u2013134. Springer, Heidelberg (2007)"},{"key":"26_CR4","unstructured":"Bojinov, H., Sanchez, D., Reber, P., Boneh, D., Lincoln, P.: Neuroscience meets cryptography: designing crypto primitives secure against rubber hose attacks. In: Proceedings of the 21st USENIX Conference on Security Symposium, Security 2012, pp. 33\u201333. USENIX Association, Berkeley (2012)"},{"key":"26_CR5","doi-asserted-by":"crossref","unstructured":"Carroll, J.B.: Human Cognitive Abilities. Cambridge University Press (1993)","DOI":"10.1017\/CBO9780511571312"},{"key":"26_CR6","unstructured":"Cattell, R.: Personality and motivation structure and measurement (1957). http:\/\/psychology.about.com\/od\/trait-theories-personality\/a\/16-personality-factors.htm"},{"key":"26_CR7","doi-asserted-by":"crossref","unstructured":"Chen, K.-T., Hong, L.-W.: User identification based on game-play activity patterns. In: Proceedings of the 6th ACM SIGCOMM Workshop on Network and System Support for Games, NetGames 2007, pp. 7\u201312. ACM, New York (2007)","DOI":"10.1145\/1326257.1326259"},{"key":"26_CR8","doi-asserted-by":"crossref","unstructured":"Chen, K.-T., Kenneth Pao, H.-K., Chang, H.-C.: Game bot identification based on manifold learning. In: Proceedings of the 7th ACM SIGCOMM Workshop on Network and System Support for Games, NetGames 2008, pp. 21\u201326. ACM, New York (2008)","DOI":"10.1145\/1517494.1517498"},{"key":"26_CR9","doi-asserted-by":"crossref","unstructured":"Denning, T., Bowers, K., van Dijk, M., Juels, A.: Exploring implicit memory for painless password recovery. In: Proceedings of the SIGCHI Conference on Human Factors in Computing Systems, CHI 2011, pp. 2615\u20132618. ACM, New York (2011)","DOI":"10.1145\/1978942.1979323"},{"key":"26_CR10","unstructured":"Drimer, S., Murdoch, S.J.: Keep your enemies close: distance bounding against smartcard relay attacks. In: Proceedings of 16th USENIX Security Symposium on USENIX Security Symposium, SS 2007, pp. 7: 1\u20137: 16. USENIX Association, Berkeley (2007)"},{"key":"26_CR11","unstructured":"Fiddy, H.O.: Method and system for defeat of replay attacks against biometric authentication systems, US Patent 8,508,338 (2013)"},{"key":"26_CR12","doi-asserted-by":"crossref","unstructured":"Gianvecchio, S., Zhenyu, W., Xie, M., Wang, H.: Battle of botcraft: fighting bots in online games with human observational proofs. In: Proceedings of the 16th ACM Conference on Computer and Communications Security, CCS 2009, pp. 256\u2013268. ACM, New York (2009)","DOI":"10.1145\/1653662.1653694"},{"key":"26_CR13","unstructured":"Haeberlen, A., Aditya, P., Rodrigues, R., Druschel, P.: Accountable virtual machines. In: Proceedings of the 9th USENIX Conference on Operating Systems Design and Implementation, OSDI 2010, pp. 1\u201316. USENIX Association, Berkeley (2010)"},{"issue":"4","key":"26_CR14","doi-asserted-by":"publisher","first-page":"351","DOI":"10.1016\/S0167-739X(99)00059-X","volume":"16","author":"F Monrose","year":"2000","unstructured":"Monrose, F., Rubin, A.D.: Keystroke dynamics as a biometric for authentication. Future Generation Computer Systems 16(4), 351\u2013359 (2000)","journal-title":"Future Generation Computer Systems"},{"key":"26_CR15","doi-asserted-by":"crossref","unstructured":"McDaniel, R., Yampolskiy, R.V.: Development of embedded captcha elements for bot prevention in fischer random chess. Int. J. Comput. Games Technol., p. 2:2 (2012)","DOI":"10.1155\/2012\/178578"},{"key":"26_CR16","doi-asserted-by":"crossref","unstructured":"Pusara, M., Brodley, C.E.: User re-authentication via mouse movements. In: Proceedings of the 2004 ACM Workshop on Visualization and Data Mining for Computer Security, pp. 1\u20138. ACM (2004)","DOI":"10.1145\/1029208.1029210"},{"key":"26_CR17","unstructured":"Revett, K., Biometrics, B.: A Remote Access Approach. John Wiley & Sons Ltd. (2008)"},{"key":"26_CR18","doi-asserted-by":"crossref","unstructured":"Schluessler, T., Goglin, S., Johnson, E.: Is a bot at the controls?: detecting input data attacks. In: Proceedings of the 6th ACM SIGCOMM Workshop on Network and System Support for Games, NetGames 2007, pp. 1\u20136. ACM, New York (2007)","DOI":"10.1145\/1326257.1326258"},{"key":"26_CR19","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"206","DOI":"10.1007\/978-3-642-30729-4_15","volume-title":"Integrated Formal Methods","author":"HY Tian","year":"2012","unstructured":"Tian, H.Y., Brooke, P.J., Bosser, A.-G.: Behaviour-based cheat detection in multiplayer games with event-B. In: Derrick, J., Gnesi, S., Latella, D., Treharne, H. (eds.) IFM 2012. LNCS, vol. 7321, pp. 206\u2013220. Springer, Heidelberg (2012)"},{"key":"26_CR20","unstructured":"Thanh Ha, T.: Us developer outsourced his job to china (2013). http:\/\/www.theglobeandmail.com\/technology\/how-a-model-employee-got-away-with-outsourcing-his-software-job-to-china\/article7409256\/3\/"},{"key":"26_CR21","doi-asserted-by":"crossref","unstructured":"Woo, J., Kim, H.K.: Survey and research direction on online game security. In: Proceedings of the Workshop at SIGGRAPH Asia, WASA 2012, pp. 19\u201325. ACM, New York (2012)","DOI":"10.1145\/2425296.2425300"},{"key":"26_CR22","unstructured":"Wortham, J.: No tv? no subscription? no problem (2013). http:\/\/www.nytimes.com\/2013\/04\/07\/business\/streaming-sites-and-the-rise-of-shared-accounts.html"},{"key":"26_CR23","doi-asserted-by":"crossref","unstructured":"Watson, G.J., Safavi-Naini, R., Alimomeni, M., Locasto, M.E., Narayan, S.: Lost: location based storage. In: Proceedings of the 2012 ACM Workshop on Cloud Computing Security Workshop, CCSW 2012, pp. 59\u201370. ACM, New York (2012)","DOI":"10.1145\/2381913.2381926"},{"issue":"1","key":"26_CR24","doi-asserted-by":"publisher","first-page":"29","DOI":"10.1504\/IJCAT.2009.024593","volume":"35","author":"RV Yampolskiy","year":"2009","unstructured":"Yampolskiy, R.V., Govindaraju, V.: Strategy based behavioural biometrics: a novel approach to automated identification. Int. J. Comput. Appl. Technol. 35(1), 29\u201341 (2009)","journal-title":"Int. J. Comput. Appl. Technol."}],"container-title":["Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering","Security and Privacy in Communication Networks"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-28865-9_26","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,1]],"date-time":"2025-06-01T06:36:57Z","timestamp":1748759817000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-28865-9_26"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015]]},"ISBN":["9783319288642","9783319288659"],"references-count":24,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-28865-9_26","relation":{},"ISSN":["1867-8211","1867-822X"],"issn-type":[{"type":"print","value":"1867-8211"},{"type":"electronic","value":"1867-822X"}],"subject":[],"published":{"date-parts":[[2015]]}}}