{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,7]],"date-time":"2024-09-07T02:54:26Z","timestamp":1725677666932},"publisher-location":"Berlin, Heidelberg","reference-count":24,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642302435"},{"type":"electronic","value":"9783642302442"}],"license":[{"start":{"date-parts":[[2012,1,1]],"date-time":"2012-01-01T00:00:00Z","timestamp":1325376000000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2012]]},"DOI":"10.1007\/978-3-642-30244-2_2","type":"book-chapter","created":{"date-parts":[[2012,4,28]],"date-time":"2012-04-28T08:55:50Z","timestamp":1335603350000},"page":"13-24","source":"Crossref","is-referenced-by-count":7,"title":["Gesture Authentication with Touch Input for Mobile Devices"],"prefix":"10.1007","author":[{"given":"Yuan","family":"Niu","sequence":"first","affiliation":[]},{"given":"Hao","family":"Chen","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"2_CR1","unstructured":"Weka machine learning project, http:\/\/www.cs.waikato.ac.nz\/~ml\/weka"},{"issue":"12","key":"2_CR2","doi-asserted-by":"publisher","first-page":"40","DOI":"10.1145\/322796.322806","volume":"42","author":"A. Adams","year":"1999","unstructured":"Adams, A., Sasse, M.A.: Users are not the enemy. Commun. ACM\u00a042(12), 40\u201346 (1999)","journal-title":"Commun. ACM"},{"key":"2_CR3","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"205","DOI":"10.1007\/978-3-642-03658-3_27","volume-title":"Human-Computer Interaction \u2013 INTERACT 2009","author":"M.K. Chong","year":"2009","unstructured":"Chong, M.K., Marsden, G.: Exploring the Use of Discrete Gestures for Authentication. In: Gross, T., Gulliksen, J., Kotz\u00e9, P., Oestreicher, L., Palanque, P., Prates, R.O., Winckler, M. (eds.) INTERACT 2009. LNCS, vol.\u00a05727, pp. 205\u2013213. Springer, Heidelberg (2009)"},{"key":"2_CR4","doi-asserted-by":"publisher","first-page":"479","DOI":"10.1145\/1455770.1455831","volume-title":"CCS 2008: Proceedings of the 15th ACM Conference on Computer and Communications Security","author":"A. Czeskis","year":"2008","unstructured":"Czeskis, A., Koscher, K., Smith, J., Kohno, T.: Rfids and secret handshakes: defending against ghost-and-leech attacks and unauthorized reads with context-aware communications. In: CCS 2008: Proceedings of the 15th ACM Conference on Computer and Communications Security, pp. 479\u2013490. ACM, New York (2008)"},{"key":"2_CR5","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"288","DOI":"10.1007\/11748625_18","volume-title":"Pervasive Computing","author":"E. Farella","year":"2006","unstructured":"Farella, E., O\u2019Modhrain, S., Benini, L., Ricc\u00f3, B.: Gesture Signature for Ambient Intelligence Applications: A Feasibility Study. In: Fishkin, K.P., Schiele, B., Nixon, P., Quigley, A. (eds.) PERVASIVE 2006. LNCS, vol.\u00a03968, pp. 288\u2013304. Springer, Heidelberg (2006)"},{"key":"2_CR6","doi-asserted-by":"crossref","unstructured":"Gafurov, D., Helkala, K., S\u00f8ndrol, T.: Biometric gait authentication using accelerometer sensor. Journal of Computers\u00a01(7) (2006)","DOI":"10.4304\/jcp.1.7.51-59"},{"key":"2_CR7","doi-asserted-by":"crossref","unstructured":"Gafurov, D., Snekkkenes, E.: Arm swing as a weak biometric for unobtrusive user authentication. In: International Conference on Intelligent Information Hiding and Multimedia Signal Processing, pp. 1080\u20131087 (2008)","DOI":"10.1109\/IIH-MSP.2008.47"},{"issue":"7","key":"2_CR8","doi-asserted-by":"publisher","first-page":"1","DOI":"10.18637\/jss.v031.i07","volume":"31","author":"T. Giorgino","year":"2009","unstructured":"Giorgino, T.: Computing and visualizing dynamic time warping alignments in r: The dtw package. Journal of Statistical Software\u00a031(7), 1\u201324 (2009)","journal-title":"Journal of Statistical Software"},{"key":"2_CR9","doi-asserted-by":"crossref","unstructured":"Jain, A., Bolle, R., Pankanti, S. (eds.): Biometrics: Personal Identification in Networked Society. Kluwer Academic Publishers (1999)","DOI":"10.1007\/b117227"},{"key":"2_CR10","unstructured":"Jakobsson, M., Shi, E., Golle, P., Chow, R.: Implicit authentication for mobile devices. In: 4th USENIX Workshop on Hot Topics in Security, HotSec 2009 (2009)"},{"key":"2_CR11","doi-asserted-by":"crossref","unstructured":"Karlof, C., Goto, B., Wagner, D.: Conditioned-safe ceremonies and a user study of an application to web authentication. In: Sixteenth Annual Network and Distributed Systems Security Symposium (2009)","DOI":"10.1145\/1572532.1572578"},{"key":"2_CR12","unstructured":"Kunze, K.: Context logger, http:\/\/contextlogger.blogspot.com\/"},{"issue":"15","key":"2_CR13","doi-asserted-by":"publisher","first-page":"2483","DOI":"10.1016\/j.patrec.2005.05.005","volume":"26","author":"H. Lei","year":"2005","unstructured":"Lei, H., Govindaraju, V.: A comparative study on the consistency of features in on-line signature verification. Pattern Recogn. Lett.\u00a026(15), 2483\u20132489 (2005)","journal-title":"Pattern Recogn. Lett."},{"key":"2_CR14","doi-asserted-by":"crossref","unstructured":"Liu, J., Wang, Z., Zhong, L., Wickramasuriya, J., Vasudevan, V.: uWave: Accelerometer-based personalized gesture recognition and its applications. In: IEEE Int. Conf. Pervasive Computing and Communication (PerCom) (March 2009)","DOI":"10.1109\/PERCOM.2009.4912759"},{"key":"2_CR15","first-page":"15","volume-title":"Proceedings of the 11th International Conference on Human-Computer Interaction with Mobile Devices and Services, MobileHCI 2009","author":"J. Liu","year":"2009","unstructured":"Liu, J., Zhong, L., Wickramasuriya, J., Vasudevan, V.: User evaluation of lightweight user authentication with a single tri-axis accelerometer. In: Proceedings of the 11th International Conference on Human-Computer Interaction with Mobile Devices and Services, MobileHCI 2009, pp. 15:1\u201315:10. ACM, New York (2009)"},{"key":"2_CR16","unstructured":"M\u00e4ntyj\u00e4rvi, J., Lindholm, M., Vildjiounaite, E., M\u00e4kel\u00e4, S., Ailisto, H.: Identifying users of portable devices from gait pattern with accelerometers. In: Proceedings of IEEE Interational Conference on Acoustics, Speech, and Signal Processing, ICASSP 2005 (2005)"},{"key":"2_CR17","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"10","DOI":"10.1007\/3-540-63930-6_98","volume-title":"Computer Vision - ACCV\u201998","author":"V.S. Nalwa","year":"1997","unstructured":"Nalwa, V.S.: Automatic On-line Signature Verification. In: Chin, R., Pong, T.-C. (eds.) ACCV 1998. LNCS, vol.\u00a01351, pp. 10\u201315. Springer, Heidelberg (1997)"},{"key":"2_CR18","doi-asserted-by":"crossref","unstructured":"Patel, S., Pierce, J., Abowd, G.: A gesture-based authentication scheme for untrusted public terminals. In: ACM Symposium on User Interface Software and Technology, pp. 157\u2013160. ACM Press (2004)","DOI":"10.1145\/1029632.1029658"},{"key":"2_CR19","unstructured":"Poppinga, B., Schl\u00f6mer, T.: wiigee: A Java based gesture recognition library for the wii remote, http:\/\/wiigee.sourceforge.net\/"},{"key":"2_CR20","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"639","DOI":"10.1007\/11492429_77","volume-title":"Pattern Recognition and Image Analysis","author":"T. Pylv\u00e4n\u00e4inen","year":"2005","unstructured":"Pylv\u00e4n\u00e4inen, T.: Accelerometer Based Gesture Recognition Using Continuous HMMs. In: Marques, J.S., P\u00e9rez de la Blanca, N., Pina, P. (eds.) IbPRIA 2005, Part I. LNCS, vol.\u00a03522, pp. 639\u2013646. Springer, Heidelberg (2005)"},{"key":"2_CR21","unstructured":"Ravi, N., Dandekar, N., Mysore, P., Littman, M.: Activity recognition from accelerometer data. In: American Association for Artificial Intelligence (2005)"},{"key":"2_CR22","first-page":"11","volume-title":"TEI 2008: Proceedings of the 2nd International Conference on Tangible and Embedded Interaction","author":"T. Schl\u00f6mer","year":"2008","unstructured":"Schl\u00f6mer, T., Poppinga, B., Henze, N., Boll, S.: Gesture recognition with a wii controller. In: TEI 2008: Proceedings of the 2nd International Conference on Tangible and Embedded Interaction, pp. 11\u201314. ACM, New York (2008)"},{"key":"2_CR23","doi-asserted-by":"crossref","first-page":"93","DOI":"10.1145\/1622176.1622194","volume-title":"Proceedings of the 22nd Annual ACM Symposium on User Interface Software and Technology, UIST 2009","author":"J.O. Wobbrock","year":"2009","unstructured":"Wobbrock, J.O.: Tapsongs: tapping rhythm-based passwords on a single binary sensor. In: Proceedings of the 22nd Annual ACM Symposium on User Interface Software and Technology, UIST 2009, pp. 93\u201396. ACM, New York (2009)"},{"issue":"5","key":"2_CR24","doi-asserted-by":"publisher","first-page":"25","DOI":"10.1109\/MSP.2004.81","volume":"2","author":"J. Yan","year":"2004","unstructured":"Yan, J., Blackwell, A., Anderson, R., Grant, A.: Password memorability and security: Empirical results. IEEE Security and Privacy\u00a02(5), 25\u201331 (2004)","journal-title":"IEEE Security and Privacy"}],"container-title":["Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering","Security and Privacy in Mobile Information and Communication Systems"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-30244-2_2","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,1,14]],"date-time":"2022-01-14T06:59:40Z","timestamp":1642143580000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-30244-2_2"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2012]]},"ISBN":["9783642302435","9783642302442"],"references-count":24,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-30244-2_2","relation":{},"ISSN":["1867-8211","1867-822X"],"issn-type":[{"type":"print","value":"1867-8211"},{"type":"electronic","value":"1867-822X"}],"subject":[],"published":{"date-parts":[[2012]]}}}