{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T10:24:07Z","timestamp":1750328647791,"version":"3.41.0"},"publisher-location":"Cham","reference-count":25,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319584683"},{"type":"electronic","value":"9783319584690"}],"license":[{"start":{"date-parts":[[2017,1,1]],"date-time":"2017-01-01T00:00:00Z","timestamp":1483228800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2017,1,1]],"date-time":"2017-01-01T00:00:00Z","timestamp":1483228800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2017]]},"DOI":"10.1007\/978-3-319-58469-0_32","type":"book-chapter","created":{"date-parts":[[2017,5,3]],"date-time":"2017-05-03T11:34:53Z","timestamp":1493811293000},"page":"474-490","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":2,"title":["Privacy-Enhanced Profile-Based Authentication Using Sparse Random Projection"],"prefix":"10.1007","author":[{"given":"Somayeh","family":"Taheri","sequence":"first","affiliation":[]},{"given":"Md Morshedul","family":"Islam","sequence":"additional","affiliation":[]},{"given":"Reihaneh","family":"Safavi-Naini","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2017,5,4]]},"reference":[{"key":"32_CR1","unstructured":"BBC News: US employee \u2018outsourced job to china\u2019 (2013). http:\/\/www.bbc.com\/news\/technology-21043693"},{"key":"32_CR2","doi-asserted-by":"publisher","DOI":"10.1007\/978-1-84882-254-2","volume-title":"Handbook of Fingerprint Recognition","author":"D Maltoni","year":"2009","unstructured":"Maltoni, D., Maio, D., Jain, A., Prabhakar, S.: Handbook of Fingerprint Recognition. Springer Science & Business Media, London (2009)"},{"key":"32_CR3","volume-title":"Handbook of Face Recognition","author":"AK Jain","year":"2011","unstructured":"Jain, A.K., Li, S.Z.: Handbook of Face Recognition. Springer, London (2011)"},{"key":"32_CR4","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"99","DOI":"10.1007\/978-3-642-18178-8_9","volume-title":"Information Security","author":"E Shi","year":"2011","unstructured":"Shi, E., Niu, Y., Jakobsson, M., Chow, R.: Implicit authentication through learning user behavior. In: Burmester, M., Tsudik, G., Magliveras, S., Ili\u0107, I. (eds.) ISC 2010. LNCS, vol. 6531, pp. 99\u2013113. Springer, Heidelberg (2011). doi:10.1007\/978-3-642-18178-8_9"},{"key":"32_CR5","unstructured":"Bonneau, J., Felten, E.W., Mittal, P., Narayanan, A.: Privacy concerns of implicit secondary factors for web authentication. In: SOUPS Workshop on \u201cWho are you?!\u201d: Adventures in Authentication (2014)"},{"issue":"1","key":"32_CR6","first-page":"5","volume":"1","author":"Y Lindell","year":"2009","unstructured":"Lindell, Y., Pinkas, B.: Secure multiparty computation for privacy-preserving data mining. J. Priv. Confidentiality 1(1), 5 (2009)","journal-title":"J. Priv. Confidentiality"},{"key":"32_CR7","series-title":"IFIP Advances in Information and Communication Technology","doi-asserted-by":"publisher","first-page":"471","DOI":"10.1007\/978-3-642-55415-5_40","volume-title":"ICT Systems Security and Privacy Protection","author":"NA Safa","year":"2014","unstructured":"Safa, N.A., Safavi-Naini, R., Shahandashti, S.F.: Privacy-preserving implicit authentication. In: Cuppens-Boulahia, N., Cuppens, F., Jajodia, S., Abou El Kalam, A., Sans, T. (eds.) SEC 2014. IFIP AICT, vol. 428, pp. 471\u2013484. Springer, Heidelberg (2014). doi:10.1007\/978-3-642-55415-5_40"},{"key":"32_CR8","doi-asserted-by":"crossref","unstructured":"Wang, Y., Plataniotis, K.N.: An analysis of random projection for changeable and privacy-preserving biometric verification. IEEE Trans. Syst. Man Cybern. Part B (Cybern.) 40(5), 1280\u20131293 (2010)","DOI":"10.1109\/TSMCB.2009.2037131"},{"key":"32_CR9","doi-asserted-by":"crossref","unstructured":"Massey, F.J.: The kolmogorov-smirnov test for goodness of fit. J. Am. Stat. Assoc. 46(253), 68\u201378 (1951)","DOI":"10.1080\/01621459.1951.10500769"},{"issue":"3","key":"32_CR10","doi-asserted-by":"crossref","first-page":"175","DOI":"10.1080\/00031305.1992.10475879","volume":"46","author":"NS Altman","year":"1992","unstructured":"Altman, N.S.: An introduction to kernel and nearest-neighbor nonparametric regression. Am. Stat. 46(3), 175\u2013185 (1992)","journal-title":"Am. Stat."},{"key":"32_CR11","unstructured":"AT&T Laboratories Cambridge: An archive of AT&T laboratories cambridge. (2002). http:\/\/www.cl.cam.ac.uk\/research\/dtg\/attarchive\/facedatabase.html"},{"key":"32_CR12","doi-asserted-by":"crossref","unstructured":"Samaria, F.S., Harter, A.C.: Parameterisation of a stochastic model for human face identification. In: Applications of Computer Vision, pp. 138\u2013142. IEEE (1994)","DOI":"10.1109\/ACV.1994.341300"},{"key":"32_CR13","doi-asserted-by":"crossref","unstructured":"Islam, M.M., Safavi-Naini, R.: POSTER: a behavioural authentication system for mobile users. In: Proceedings of ACM CCS 2016, pp. 1742\u20131744. ACM (2016)","DOI":"10.1145\/2976749.2989065"},{"key":"32_CR14","volume-title":"The Handbook of Research Synthesis and Meta-Analysis","author":"H Cooper","year":"2009","unstructured":"Cooper, H., Hedges, L.V., Valentine, J.C.: The Handbook of Research Synthesis and Meta-Analysis. Russell Sage Foundation, New York (2009)"},{"issue":"1","key":"32_CR15","doi-asserted-by":"publisher","first-page":"60","DOI":"10.1002\/rsa.10073","volume":"22","author":"S Dasgupta","year":"2003","unstructured":"Dasgupta, S., Gupta, A.: An elementary proof of a theorem of johnson and lindenstrauss. Random Struct. Algorithms 22(1), 60\u201365 (2003)","journal-title":"Random Struct. Algorithms"},{"key":"32_CR16","doi-asserted-by":"crossref","unstructured":"Bingham, E., Mannila, H.: Random projection in dimensionality reduction: applications to image and text data. In: Proceedings of SIGKDD 2001, pp. 245\u2013250. ACM (2001)","DOI":"10.1145\/502512.502546"},{"issue":"4","key":"32_CR17","doi-asserted-by":"publisher","first-page":"671","DOI":"10.1016\/S0022-0000(03)00025-4","volume":"66","author":"D Achlioptas","year":"2003","unstructured":"Achlioptas, D.: Database-friendly random projections: Johnson-lindenstrauss with binary coins. J. Comput. Syst. Sci. 66(4), 671\u2013687 (2003)","journal-title":"J. Comput. Syst. Sci."},{"issue":"1","key":"32_CR18","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1137\/0614001","volume":"14","author":"JW Demmel","year":"1993","unstructured":"Demmel, J.W., Higham, N.J.: Improved error bounds for underdetermined system solvers. SIAM J. Matrix Anal. Appl. 14(1), 1\u201314 (1993)","journal-title":"SIAM J. Matrix Anal. Appl."},{"issue":"1","key":"32_CR19","doi-asserted-by":"publisher","first-page":"92","DOI":"10.1109\/TKDE.2006.14","volume":"18","author":"K Liu","year":"2006","unstructured":"Liu, K., Kargupta, H., Ryan, J.: Random projection-based multiplicative data perturbation for privacy preserving distributed data mining. IEEE Trans. Knowl. Data Eng. 18(1), 92\u2013106 (2006)","journal-title":"IEEE Trans. Knowl. Data Eng."},{"issue":"3","key":"32_CR20","doi-asserted-by":"publisher","first-page":"395","DOI":"10.1145\/3979.4017","volume":"10","author":"CK Liew","year":"1985","unstructured":"Liew, C.K., Choi, U.J., Liew, C.J.: A data distortion by probability distribution. ACM Trans. Database Syst. (TODS) 10(3), 395\u2013411 (1985)","journal-title":"ACM Trans. Database Syst. (TODS)"},{"key":"32_CR21","unstructured":"Lefons, E., Silvestri, A., Tangorra, F.: An analytic approach to statistical databases. In: VLDB, pp. 260\u2013274. Citeseer (1983)"},{"key":"32_CR22","doi-asserted-by":"crossref","unstructured":"Agrawal, R., Srikant, R.: Privacy-preserving data mining. ACM Sigmod Rec. 29, 439\u2013450 (2000). ACM","DOI":"10.1145\/335191.335438"},{"key":"32_CR23","doi-asserted-by":"publisher","DOI":"10.1002\/9780470997949","volume-title":"Behavioral Biometrics: A Remote Access Approach","author":"K Revett","year":"2008","unstructured":"Revett, K.: Behavioral Biometrics: A Remote Access Approach. Wiley, West Sussex (2008)"},{"issue":"1","key":"32_CR24","doi-asserted-by":"publisher","first-page":"136","DOI":"10.1109\/TIFS.2012.2225048","volume":"8","author":"M Frank","year":"2013","unstructured":"Frank, M., Biedert, R., Ma, E., Martinovic, I., Song, D.: Touchalytics: On the applicability of touchscreen input as a behavioral biometric for continuous authentication. IEEE Trans. Inf. Forensics Secur. 8(1), 136\u2013148 (2013)","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"key":"32_CR25","series-title":"Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering","doi-asserted-by":"publisher","first-page":"477","DOI":"10.1007\/978-3-319-28865-9_26","volume-title":"Security and Privacy in Communication Networks","author":"M Alimomeni","year":"2015","unstructured":"Alimomeni, M., Safavi-Naini, R.: How to Prevent to delegate authentication. In: Thuraisingham, B., Wang, X., Yegneswaran, V. (eds.) SecureComm 2015. LNICST, vol. 164, pp. 477\u2013499. Springer, Cham (2015). doi:10.1007\/978-3-319-28865-9_26"}],"container-title":["IFIP Advances in Information and Communication Technology","ICT Systems Security and Privacy Protection"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-58469-0_32","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T03:54:52Z","timestamp":1750218892000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-319-58469-0_32"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017]]},"ISBN":["9783319584683","9783319584690"],"references-count":25,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-58469-0_32","relation":{},"ISSN":["1868-4238","1868-422X"],"issn-type":[{"type":"print","value":"1868-4238"},{"type":"electronic","value":"1868-422X"}],"subject":[],"published":{"date-parts":[[2017]]},"assertion":[{"value":"4 May 2017","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"SEC","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"IFIP International Conference on ICT Systems Security and Privacy Protection","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Rome","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Italy","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2017","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"29 May 2017","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"31 May 2017","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"32","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"sec2017","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/ifipsec.org\/2017\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"This content has been made available to all.","name":"free","label":"Free to read"}]}}