{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T20:30:49Z","timestamp":1725568249738},"publisher-location":"Berlin, Heidelberg","reference-count":12,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540402176"},{"type":"electronic","value":"9783540448716"}],"license":[{"start":{"date-parts":[[2003,1,1]],"date-time":"2003-01-01T00:00:00Z","timestamp":1041379200000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2003]]},"DOI":"10.1007\/978-3-540-44871-6_29","type":"book-chapter","created":{"date-parts":[[2010,10,26]],"date-time":"2010-10-26T14:17:11Z","timestamp":1288102631000},"page":"246-254","update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":5,"title":["A User Authentication Technic Using a~Web Interaction Monitoring System"],"prefix":"10.1007","author":[{"given":"Hugo","family":"Gamboa","sequence":"first","affiliation":[]},{"given":"Ana","family":"Fred","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2003,9,18]]},"reference":[{"key":"29_CR1","unstructured":"Abernethy, R.B.: The New Weibull Handbook. Robert B. Abernethy (2000)"},{"key":"29_CR2","unstructured":"BenZeghiba, M.F., Bourlard, H., Mariethoz, J.: Speaker verification based on user-customized password. Technical Report IDIAP-RR 01-13, Institut Dalle Molle d\u2019Intelligence Artificial Perceprive (2001)"},{"key":"29_CR3","doi-asserted-by":"publisher","DOI":"10.1007\/978-1-4899-4541-9","volume-title":"An Introduction to the Bootstrap","author":"B. Efron","year":"1993","unstructured":"Efron, B., Tibshirani, R.J.: An Introduction to the Bootstrap. Chapman & Hall, Boca Raton (1993)"},{"key":"29_CR4","unstructured":"Gamboa, H., Ferreira, V.: WIDAM - Web Interaction Display and Monitoring. In: Proceedings of the 5th International Conference on Enterprise Information Systems, vol.\u00a04, pp. 21\u201327 (2003)"},{"key":"29_CR5","unstructured":"Gamboa, H., Fred, A.: An Identity Authentication System Based On Human Computer Interaction Behaviour. In: Proceedings of the 3rd International Workshop on Pattern Recognition in Information Systems, pp. 46\u201355 (2003)"},{"key":"29_CR6","unstructured":"Gupta, J., McCabe, A.: A review of dynamic handwritten signature verification. Technical report, James Cook University, Australia (1997)"},{"key":"29_CR7","unstructured":"Hors, A.L., Hgaret, P.L., Wood, L.: Document object model level 2 core. Technical report, W3C (2000)"},{"issue":"1","key":"29_CR8","doi-asserted-by":"publisher","first-page":"4","DOI":"10.1109\/34.824819","volume":"22","author":"A.K. Jain","year":"2000","unstructured":"Jain, A.K., Duin, R.P.W., Mao, J.: Statistical pattern recognition: A review. IEEE Transactions on Pattern Analysis and Machine Intelligence\u00a022(1) (2000)","journal-title":"IEEE Transactions on Pattern Analysis and Machine Intelligence"},{"key":"29_CR9","unstructured":"Matyas Jr., V., Riha, Z.: Biometric authentication systems. Technical report, ECOM-MONITOR (2000)"},{"key":"29_CR10","unstructured":"Mansfield, T., Roethenbaugh, G.: 1999 glossary of biometric terms. Technical report, Association for Biometrics (1999)"},{"key":"29_CR11","unstructured":"Pixley, T.: Document object model (dom) level 2 events specification. Technical report, W3C (2000)"},{"key":"29_CR12","unstructured":"Ruggles, T.: Comparison of biometric techniques. Technical report, California Welfare Fraud Prevention System (2002)"}],"container-title":["Lecture Notes in Computer Science","Pattern Recognition and Image Analysis"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-540-44871-6_29","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,2,10]],"date-time":"2020-02-10T09:06:16Z","timestamp":1581325576000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-540-44871-6_29"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2003]]},"ISBN":["9783540402176","9783540448716"],"references-count":12,"URL":"https:\/\/doi.org\/10.1007\/978-3-540-44871-6_29","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2003]]},"assertion":[{"value":"18 September 2003","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}}]}}