{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,10]],"date-time":"2024-09-10T17:08:08Z","timestamp":1725988088016},"publisher-location":"Cham","reference-count":25,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319985503"},{"type":"electronic","value":"9783319985510"}],"license":[{"start":{"date-parts":[[2018,1,1]],"date-time":"2018-01-01T00:00:00Z","timestamp":1514764800000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2018]]},"DOI":"10.1007\/978-3-319-98551-0_20","type":"book-chapter","created":{"date-parts":[[2018,8,23]],"date-time":"2018-08-23T12:05:15Z","timestamp":1535025915000},"page":"171-181","update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Multi-modal User Interface Design for a Face and Voice Recognition Biometric Authentication System"],"prefix":"10.1007","author":[{"given":"Ilia","family":"Adami","sequence":"first","affiliation":[]},{"given":"Margherita","family":"Antona","sequence":"additional","affiliation":[]},{"given":"Emmanouil G.","family":"Spanakis","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2018,8,24]]},"reference":[{"doi-asserted-by":"crossref","unstructured":"Trewin, S., Swart, C., Koved, L., Martino, J., Singh, K., Ben-David, S.: Biometric authentication on a mobile device: a study of user effort, error and task disruption. In: Proceedings of the 28th Annual Computer Security Applications Conference, pp. 159\u2013168. ACM, December 2012","key":"20_CR1","DOI":"10.1145\/2420950.2420976"},{"issue":"5","key":"20_CR2","doi-asserted-by":"publisher","first-page":"88","DOI":"10.1109\/MSP.2015.2427849","volume":"32","author":"K Nandakumar","year":"2015","unstructured":"Nandakumar, K., Jain, A.K.: Biometric template protection: bridging the performance gap between theory and practice. IEEE Sig. Process. Mag. 32(5), 88\u2013100 (2015)","journal-title":"IEEE Sig. Process. Mag."},{"issue":"12","key":"20_CR3","doi-asserted-by":"publisher","first-page":"2264","DOI":"10.1109\/TIFS.2014.2349158","volume":"9","author":"I Chingovska","year":"2014","unstructured":"Chingovska, I., Dos Anjos, A.R., Marcel, S.: Biometrics evaluation under spoofing attacks. IEEE Trans. Inf. Forensics Secur. 9(12), 2264\u20132276 (2014)","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"issue":"5","key":"20_CR4","doi-asserted-by":"publisher","first-page":"1101","DOI":"10.1016\/j.intcom.2006.01.004","volume":"18","author":"DT Toledano","year":"2006","unstructured":"Toledano, D.T., Pozo, R.F., Trapote, \u00c1.H., G\u00f3mez, L.H.: Usability evaluation of multi-modal biometric verification systems. Interact. Comput. 18(5), 1101\u20131122 (2006)","journal-title":"Interact. Comput."},{"doi-asserted-by":"crossref","unstructured":"Bhagavatula, C., Ur, B., Iacovino, K., Kywe, S.M., Cranor, L.F., Savvides, M.: Biometric authentication on iphone and android: usability, perceptions, and influences on adoption. In: Proceedings of USEC, pp. 1\u20132 (2015)","key":"20_CR5","DOI":"10.14722\/usec.2015.23003"},{"key":"20_CR6","doi-asserted-by":"publisher","first-page":"103","DOI":"10.1016\/j.dss.2013.05.010","volume":"56","author":"CL Miltgen","year":"2013","unstructured":"Miltgen, C.L., Popovi\u010d, A., Oliveira, T.: Determinants of end-user acceptance of biometrics: integrating the \u201cBig 3\u201d of technology acceptance with privacy context. Decis. Support Syst. 56, 103\u2013114 (2013)","journal-title":"Decis. Support Syst."},{"doi-asserted-by":"crossref","unstructured":"De Luca, A., Hang, A., Von Zezschwitz, E., Hussmann, H.: I feel like I\u2019m taking selfies all day! Towards understanding biometric authentication on smartphones. In: Proceedings of the 33rd Annual ACM Conference on Human Factors in Computing Systems, pp. 1411\u20131414. ACM, April 2015","key":"20_CR7","DOI":"10.1145\/2702123.2702141"},{"doi-asserted-by":"crossref","unstructured":"Patrick, A.S.: Usability and acceptability of biometric security systems. In: Financial Cryptography, p. 105, January 2004","key":"20_CR8","DOI":"10.1007\/978-3-540-27809-2_11"},{"doi-asserted-by":"crossref","unstructured":"De Luca, A., Hang, A., Brudy, F., Lindner, C., Hussmann, H.: Touch me once and I know it\u2019s you! Implicit authentication based on touch screen patterns. In: Proceedings of the SIGCHI Conference on Human Factors in Computing Systems, pp. 987\u2013996. ACM, May 2012","key":"20_CR9","DOI":"10.1145\/2207676.2208544"},{"doi-asserted-by":"crossref","unstructured":"Blanco-Gonzalo, R., Diaz-Fernandez, L., Miguel-Hurtado, O., Sanchez-Reillo, R.: Usability evaluation of biometrics in mobile environments. In: 2013 6th International Conference on Human System Interaction (HSI), pp. 123\u2013128. IEEE, June 2013","key":"20_CR10","DOI":"10.1109\/HSI.2013.6577812"},{"key":"20_CR11","doi-asserted-by":"publisher","first-page":"80","DOI":"10.1016\/j.patrec.2015.12.013","volume":"79","author":"AK Jain","year":"2016","unstructured":"Jain, A.K., Nandakumar, K., Ross, A.: 50 years of biometric research: accomplishments, challenges, and opportunities. Pattern Recogn. Lett. 79, 80\u2013105 (2016)","journal-title":"Pattern Recogn. Lett."},{"key":"20_CR12","doi-asserted-by":"publisher","first-page":"89","DOI":"10.1016\/j.csi.2017.03.009","volume":"53","author":"D Qui\u00f1ones","year":"2017","unstructured":"Qui\u00f1ones, D., Rusu, C.: How to develop usability heuristics: a systematic literature review. Comput. Stand. Interfaces 53, 89\u2013122 (2017)","journal-title":"Comput. Stand. Interfaces"},{"key":"20_CR13","doi-asserted-by":"publisher","DOI":"10.1007\/978-0-387-77326-1","volume-title":"Introduction to Biometrics","author":"A Jain","year":"2011","unstructured":"Jain, A., Ross, A.A., Nandakumar, K.: Introduction to Biometrics. Springer Science & Business Media, Berlin (2011)"},{"doi-asserted-by":"crossref","unstructured":"Nielsen, J.: Usability inspection methods. In: Conference Companion on Human Factors in Computing Systems, pp. 413\u2013414. ACM, April 1994","key":"20_CR14","DOI":"10.1145\/259963.260531"},{"issue":"3","key":"20_CR15","doi-asserted-by":"publisher","first-page":"338","DOI":"10.1145\/77481.77486","volume":"33","author":"R Molich","year":"1990","unstructured":"Molich, R., Nielsen, J.: Improving a human-computer dialogue. Commun. ACM 33(3), 338\u2013348 (1990)","journal-title":"Commun. ACM"},{"doi-asserted-by":"crossref","unstructured":"Y\u00e1\u00f1ez G\u00f3mez, R., Cascado Caballero, D., Sevillano, J.L.: Heuristic evaluation on mobile interfaces: a new checklist. Sci. World J. 2014 (2014)","key":"20_CR16","DOI":"10.1155\/2014\/434326"},{"key":"20_CR17","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"465","DOI":"10.1007\/978-3-319-07668-3_45","volume-title":"Design, User Experience, and Usability. Theories, Methods, and Tools for Designing the User Experience","author":"G Joyce","year":"2014","unstructured":"Joyce, G., Lilley, M.: Towards the development of usability heuristics for native smartphone mobile applications. In: Marcus, A. (ed.) DUXU 2014. LNCS, vol. 8517, pp. 465\u2013474. Springer, Cham (2014). https:\/\/doi.org\/10.1007\/978-3-319-07668-3_45"},{"key":"20_CR18","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"484","DOI":"10.1007\/978-3-319-07668-3_47","volume-title":"Design, User Experience, and Usability. Theories, Methods, and Tools for Designing the User Experience","author":"E Vilar Neto","year":"2014","unstructured":"Vilar Neto, E., Campos, F.F.: Evaluating the usability on multimodal interfaces: a case study on tablets applications. In: Marcus, A. (ed.) DUXU 2014. LNCS, vol. 8517, pp. 484\u2013495. Springer, Cham (2014). https:\/\/doi.org\/10.1007\/978-3-319-07668-3_47"},{"issue":"8","key":"20_CR19","doi-asserted-by":"publisher","first-page":"2673","DOI":"10.1016\/j.patcog.2014.01.016","volume":"47","author":"JA Unar","year":"2014","unstructured":"Unar, J.A., Seng, W.C., Abbasi, A.: A review of biometric technology along with trends and prospects. Pattern Recogn. 47(8), 2673\u20132688 (2014)","journal-title":"Pattern Recogn."},{"unstructured":"Apple Developer: UI design do\u2019s and don\u2019ts (2017). https:\/\/developer.apple.com\/design\/tips\/","key":"20_CR20"},{"unstructured":"Google Developers: Up and running with material design (2017). https:\/\/developer.android.com\/design\/index.html","key":"20_CR21"},{"doi-asserted-by":"crossref","unstructured":"Spanakis, E.G., Spanakis, M., Karantanas, A., Marias, K.: Secure access to patient\u2019s health records using SpeechXRays a multi-channel biometrics platform for user authentication. In: 38th Annual International Conference of the IEEE Engineering in Medicine and Biology Society, Orlando, FL, USA, 16\u201320 August 2016 (2016)","key":"20_CR22","DOI":"10.1109\/EMBC.2016.7591248"},{"doi-asserted-by":"crossref","unstructured":"Chronaki, C., et al.: An eHealth platform for instant interaction among health professionals. In: Computers in Cardiology 2003, Thessaloniki Chalkidiki, 21\u201324 September 2003, vol. 30, pp. 101\u2013104 (2003). (02766574)","key":"20_CR23","DOI":"10.1109\/CIC.2003.1291100"},{"unstructured":"Spat, S., et al.: A mobile android-based application for in-hospital glucose management in compliance with the medical device directive for software. In: 2nd International ICST Conference on Wireless Mobile Communication and Healthcare (MobiHealth 2011), Kos Island, Greece, 5\u20137 October 2011 (2011)","key":"20_CR24"},{"doi-asserted-by":"publisher","unstructured":"Spanakis, E.G., et al.: Technology-based innovations to foster personalized healthy lifestyles and well-being: a targeted review. J. Med. Internet Res. 18(6), e128 (2016). https:\/\/doi.org\/10.2196\/jmir.4863","key":"20_CR25","DOI":"10.2196\/jmir.4863"}],"container-title":["Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering","Wireless Mobile Communication and Healthcare"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-98551-0_20","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,10,22]],"date-time":"2019-10-22T20:49:33Z","timestamp":1571777373000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-98551-0_20"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018]]},"ISBN":["9783319985503","9783319985510"],"references-count":25,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-98551-0_20","relation":{},"ISSN":["1867-8211","1867-822X"],"issn-type":[{"type":"print","value":"1867-8211"},{"type":"electronic","value":"1867-822X"}],"subject":[],"published":{"date-parts":[[2018]]}}}