{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,3]],"date-time":"2025-12-03T03:32:22Z","timestamp":1764732742398,"version":"3.40.3"},"publisher-location":"Cham","reference-count":17,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319930398"},{"type":"electronic","value":"9783319930404"}],"license":[{"start":{"date-parts":[[2018,1,1]],"date-time":"2018-01-01T00:00:00Z","timestamp":1514764800000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2018]]},"DOI":"10.1007\/978-3-319-93040-4_64","type":"book-chapter","created":{"date-parts":[[2018,6,16]],"date-time":"2018-06-16T13:29:41Z","timestamp":1529155781000},"page":"816-828","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":2,"title":["Utilizing Sequences of Touch Gestures for User Verification on Mobile Devices"],"prefix":"10.1007","author":[{"given":"Liron Ben","family":"Kimon","sequence":"first","affiliation":[]},{"given":"Yisroel","family":"Mirsky","sequence":"additional","affiliation":[]},{"given":"Lior","family":"Rokach","sequence":"additional","affiliation":[]},{"given":"Bracha","family":"Shapira","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2018,6,17]]},"reference":[{"unstructured":"Lookout Blog: Phone Theft in America: What really happens when your phone gets grabbed (2014). https:\/\/blog.lookout.com\/blog\/2014\/05\/07\/phone-theft-in-america\/","key":"64_CR1"},{"unstructured":"Lee, A.: A Thief Snatched My iPhone (2014). http:\/\/readwrite.com\/2014\/06\/23\/iphone-smartphone-theft-crime\/","key":"64_CR2"},{"unstructured":"Consumer Report: Smart phone thefts rose to 3.1 million in 2013 (2014). http:\/\/www.consumerreports.org\/cro\/news\/2014\/04\/smart-phone-thefts-rose-to-3-1-million-last-year\/index.htm","key":"64_CR3"},{"issue":"7","key":"64_CR4","doi-asserted-by":"publisher","first-page":"519","DOI":"10.1016\/j.cose.2005.08.003","volume":"24","author":"NL Clarke","year":"2005","unstructured":"Clarke, N.L., Furnell, S.M.: Authentication of users on mobile telephones - a survey of attitudes and practices. Comput. Secur. 24(7), 519\u2013527 (2005)","journal-title":"Comput. Secur."},{"key":"64_CR5","first-page":"A1","volume":"20","author":"A Vance","year":"2010","unstructured":"Vance, A.: If your password is 123456, just make it hackme. N.Y. Times 20, A1 (2010)","journal-title":"N.Y. Times"},{"unstructured":"Aviv, A.J., Gibson, K., Mossop, E., Blaze, M., Smith, J.M.: Smudge attacks on smartphone touch screens. In: USENIX Conference on Offensive Technology, pp. 1\u20137 (2010)","key":"64_CR6"},{"doi-asserted-by":"crossref","unstructured":"Feng, T., Liu, Z., Kwon, K.A., Shi, W., Carbunar, B., Jiang, Y., Nguyen, N.: Continuous mobile authentication using touchscreen gestures. In: 2012 IEEE International Conference on Technologies for Homeland Security, HST 2012, pp. 451\u2013456 (2012)","key":"64_CR7","DOI":"10.1109\/THS.2012.6459891"},{"issue":"1","key":"64_CR8","doi-asserted-by":"publisher","first-page":"136","DOI":"10.1109\/TIFS.2012.2225048","volume":"8","author":"M Frank","year":"2013","unstructured":"Frank, M., et al.: Touchalytics: on the applicability of touchscreen input as a behavioral biometric for continuous authentication. IEEE Trans. Inf. Forensics Secur. 8(1), 136\u2013148 (2013)","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"key":"64_CR9","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"405","DOI":"10.1007\/978-3-319-26362-5_19","volume-title":"Research in Attacks, Intrusions, and Defenses","author":"R Murmuria","year":"2015","unstructured":"Murmuria, R., Stavrou, A., Barbar\u00e1, D., Fleck, D.: Continuous authentication on mobile devices using power consumption, touch gestures and physical movement of users. In: Bos, H., Monrose, F., Blanc, G. (eds.) RAID 2015. LNCS, vol. 9404, pp. 405\u2013424. Springer, Cham (2015). https:\/\/doi.org\/10.1007\/978-3-319-26362-5_19"},{"doi-asserted-by":"crossref","unstructured":"Ben Kimon, L., et al.: User verification on mobile devices using sequences of touch gestures. In: Proceedings of the 25th Conference on User Modeling, Adaptation and Personalization. ACM (2017)","key":"64_CR10","DOI":"10.1145\/3079628.3079644"},{"issue":"4","key":"64_CR11","doi-asserted-by":"publisher","first-page":"49","DOI":"10.1109\/MSP.2016.2555335","volume":"33","author":"VM Patel","year":"2016","unstructured":"Patel, V.M., Chellappa, R., Chandra, D., Barbello, B.: Continuous user authentication on mobile devices: recent progress and remaining challenges. IEEE Sig. Process. Mag. 33(4), 49\u201361 (2016)","journal-title":"IEEE Sig. Process. Mag."},{"doi-asserted-by":"crossref","unstructured":"Feng, T., Yang, J., Yan, Z., Tapia, E.M., Shi, W.: TIPS: context-aware implicit user identification using touch screen in uncontrolled environments. In: Proceedings of the 15th Workshop on Mobile Computing Systems and Applications, pp. 9:1\u20139:6 (2014)","key":"64_CR12","DOI":"10.1145\/2565585.2565592"},{"doi-asserted-by":"crossref","unstructured":"Zhao, X., Feng, T., Shi, W.: Continuous mobile authentication using a novel graphic touch gesture feature. In: IEEE 6th International Conference on Biometrics: Theory, Applications and Systems, BTAS 2013 (2013)","key":"64_CR13","DOI":"10.1109\/BTAS.2013.6712747"},{"issue":"11","key":"64_CR14","doi-asserted-by":"publisher","first-page":"1780","DOI":"10.1109\/TIFS.2014.2350916","volume":"9","author":"X Zhao","year":"2014","unstructured":"Zhao, X., Feng, T., Shi, W., Kakadiaris, I.A.: Mobile user authentication using statistical touch dynamics images. IEEE Trans. Inf. Forensics Secur. 9(11), 1780\u20131789 (2014)","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"doi-asserted-by":"crossref","unstructured":"Shi, W., Yang, J., Jiang, Y., Yang, F., Xiong, Y.: SenGuard: passive user identification on smartphones using multiple sensors. In: International Conference on Wireless and Mobile Computing, Networking and Communications, pp. 141\u2013148 (2011)","key":"64_CR15","DOI":"10.1109\/WiMOB.2011.6085412"},{"issue":"3","key":"64_CR16","doi-asserted-by":"publisher","first-page":"299","DOI":"10.1109\/TKDE.2005.50","volume":"17","author":"J Huang","year":"2005","unstructured":"Huang, J., Ling, C.X.: Using AUC and accuracy in evaluating learning algorithms. IEEE Trans. Knowl. Data Eng. 17(3), 299\u2013310 (2005)","journal-title":"IEEE Trans. Knowl. Data Eng."},{"doi-asserted-by":"crossref","unstructured":"Rokach, L., Maimom, O.: Data mining with decision trees: theory and applications (2007)","key":"64_CR17","DOI":"10.1142\/9789812771728"}],"container-title":["Lecture Notes in Computer Science","Advances in Knowledge Discovery and Data Mining"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-93040-4_64","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,3,13]],"date-time":"2024-03-13T10:10:45Z","timestamp":1710324645000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-319-93040-4_64"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018]]},"ISBN":["9783319930398","9783319930404"],"references-count":17,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-93040-4_64","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2018]]},"assertion":[{"value":"17 June 2018","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"PAKDD","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Pacific-Asia Conference on Knowledge Discovery and Data Mining","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Melbourne, VIC","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Australia","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2018","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"3 June 2018","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"6 June 2018","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"22","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"pakdd2018","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/prada-research.net\/pakdd18\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}