{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,28]],"date-time":"2025-10-28T14:51:35Z","timestamp":1761663095638,"version":"3.40.3"},"publisher-location":"Berlin, Heidelberg","reference-count":34,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642316678"},{"type":"electronic","value":"9783642316685"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2012]]},"DOI":"10.1007\/978-3-642-31668-5_10","type":"book-chapter","created":{"date-parts":[[2012,6,28]],"date-time":"2012-06-28T04:34:43Z","timestamp":1340858083000},"page":"130-143","source":"Crossref","is-referenced-by-count":51,"title":["Exploring Touch-Screen Biometrics for User Identification on Smart Phones"],"prefix":"10.1007","author":[{"given":"Julio","family":"Angulo","sequence":"first","affiliation":[]},{"given":"Erik","family":"W\u00e4stlund","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"10_CR1","first-page":"1","volume-title":"Proceedings of the 4th USENIX Conference on Offensive Technologies, WOOT 2010","author":"A.J. Aviv","year":"2010","unstructured":"Aviv, A.J., Gibson, K., Mossop, E., Blaze, M., Smith, J.M.: Smudge attacks on smartphone touch screens. In: Proceedings of the 4th USENIX Conference on Offensive Technologies, WOOT 2010, pp. 1\u20137. USENIX Association, Berkeley (2010)"},{"key":"10_CR2","unstructured":"Biddle, R., Chiasson, S., van Oorschot, P.: Graphical passwords: Learning from the first twelve years. Technical report TR-11-01, School of Computer Science, Carleton University (January 2011)"},{"issue":"1","key":"10_CR3","doi-asserted-by":"publisher","first-page":"5","DOI":"10.1023\/A:1010933404324","volume":"45","author":"L. Breiman","year":"2001","unstructured":"Breiman, L.: Random forests. Machine Learning\u00a045(1), 5\u201332 (2001)","journal-title":"Machine Learning"},{"key":"10_CR4","unstructured":"Brubeck, M., Schepers, D., Moon, S.: Touch events version 1 - w3c working draft (September 13, 2011), http:\/\/www.w3.org\/TR\/2011\/WD-touch-events-20110913\/ (accessed October 27, 2011)"},{"key":"10_CR5","volume-title":"4th Hot Topics in Privacy Enhancing Technologies (HotPETs). The 11th Privacy Enhancing Technologies Symposium","author":"P. Chairunnanda","year":"2011","unstructured":"Chairunnanda, P., Pham, N., Hengartner, U.: Privacy: Gone with the Typing! Identifying Web Users by Their Typing Pattern. In: 4th Hot Topics in Privacy Enhancing Technologies (HotPETs). The 11th Privacy Enhancing Technologies Symposium. Springer, Waterloo (2011)"},{"issue":"7","key":"10_CR6","doi-asserted-by":"publisher","first-page":"519","DOI":"10.1016\/j.cose.2005.08.003","volume":"24","author":"N.L. Clarke","year":"2005","unstructured":"Clarke, N.L., Furnell, S.: Authentication of users on mobile telephones - a survey of attitudes and practices. Computers & Security\u00a024(7), 519\u2013527 (2005)","journal-title":"Computers & Security"},{"issue":"1","key":"10_CR7","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/s10207-006-0006-6","volume":"6","author":"N.L. Clarke","year":"2007","unstructured":"Clarke, N.L., Furnell, S.: Authenticating mobile phone users using keystroke analysis. Int. J. Inf. Sec.\u00a06(1), 1\u201314 (2007)","journal-title":"Int. J. Inf. Sec."},{"key":"10_CR8","series-title":"IFIP AICT","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/978-3-642-01244-0_1","volume-title":"Emerging Challenges for Security, Privacy and Trust","author":"N. Clarke","year":"2009","unstructured":"Clarke, N., Karatzouni, S., Furnell, S.: Flexible and Transparent User Authentication for Mobile Devices. In: Gritzalis, D., Lopez, J. (eds.) SEC 2009. IFIP AICT, vol.\u00a0297, pp. 1\u201312. Springer, Heidelberg (2009)"},{"key":"10_CR9","first-page":"249","volume-title":"Proceedings of the 6th ACM Symposium on Information, Computer and Communications Security, ASIACCS 2011","author":"M. Conti","year":"2011","unstructured":"Conti, M., Zachia-Zlatea, I., Crispo, B.: Mind how you answer me!: transparently authenticating the user of a smartphone when answering or placing a call. In: Proceedings of the 6th ACM Symposium on Information, Computer and Communications Security, ASIACCS 2011, pp. 249\u2013259. ACM, New York (2011)"},{"key":"10_CR10","doi-asserted-by":"publisher","first-page":"306","DOI":"10.1109\/IIHMSP.2010.83","volume-title":"Proceedings of the 2010 Sixth International Conference on Intelligent Information Hiding and Multimedia Signal Processing, IIH-MSP 2010","author":"M.O. Derawi","year":"2010","unstructured":"Derawi, M.O., Nickel, C., Bours, P., Busch, C.: Unobtrusive user-authentication on mobile phones using biometric gait recognition. In: Proceedings of the 2010 Sixth International Conference on Intelligent Information Hiding and Multimedia Signal Processing, IIH-MSP 2010, pp. 306\u2013311. IEEE Computer Society, USA (2010)"},{"issue":"4","key":"10_CR11","first-page":"25","volume":"1","author":"J.E. Ekberg","year":"2010","unstructured":"Ekberg, J.E.: Mobile trusted computing based on MTM. IJDTIS\u00a01(4), 25\u201342 (2010)","journal-title":"IJDTIS"},{"key":"10_CR12","doi-asserted-by":"crossref","unstructured":"Ekberg, J.E., Bugiel, S.: Trust in a small package: minimized MRTM software implementation for mobile secure environments. In: STC, pp. 9\u201318 (2009)","DOI":"10.1145\/1655108.1655111"},{"key":"10_CR13","volume-title":"Genetic Algorithms in Search, Optimization and Machine Learning","author":"D.E. Goldberg","year":"1989","unstructured":"Goldberg, D.E.: Genetic Algorithms in Search, Optimization and Machine Learning, 1st edn. Addison-Wesley Longman Publishing Co., Boston (1989)","edition":"1"},{"key":"10_CR14","unstructured":"Google: Android: Android - open source project (June 2011), http:\/\/source.android.com\/"},{"key":"10_CR15","doi-asserted-by":"publisher","first-page":"1495","DOI":"10.1016\/S0893-6080(97)00002-6","volume":"10","author":"Y.S. Hwang","year":"1997","unstructured":"Hwang, Y.S., Bang, S.Y.: An efficient method to construct a radial basis function neural network classifier. Neural Netw.\u00a010, 1495\u20131503 (1997)","journal-title":"Neural Netw."},{"key":"10_CR16","series-title":"IFIP","first-page":"253","volume-title":"SEC 2007","author":"S. Karatzouni","year":"2007","unstructured":"Karatzouni, S., Clarke, N.L.: Keystroke Analysis for Thumb-based Keyboards on Mobile Devices. In: Venter, H., Eloff, M., Labuschagne, L., Eloff, J., von Solms, R. (eds.) SEC 2007. IFIP, vol.\u00a0232, pp. 253\u2013263. Springer, Boston (2007)"},{"key":"10_CR17","unstructured":"Karlson, A.K., Bederson, B.B., Contreras-Vidal, J.L.: Understanding Single-Handed Mobile Device Interaction (2006)"},{"key":"10_CR18","doi-asserted-by":"crossref","unstructured":"Kekre, H., Bharadi, V.: Ageing adaptation for multimodal biometrics using adaptive feature set update algorithm. In: IEEE International Advance Computing Conference, pp. 535\u2013540 (2009)","DOI":"10.1109\/IADCC.2009.4809068"},{"key":"10_CR19","doi-asserted-by":"crossref","unstructured":"Kennedy, J., Eberhart, R.C.: Particle swarm optimization. In: Proceedings of the IEEE International Conference on Neural Networks. pp. 1942\u20131948 (1995)","DOI":"10.1109\/ICNN.1995.488968"},{"key":"10_CR20","series-title":"LNCS","doi-asserted-by":"publisher","first-page":"256","DOI":"10.1007\/978-3-642-15512-3_14","volume-title":"Recent Advances in Intrusion Detection","author":"K. Killourhy","year":"2010","unstructured":"Killourhy, K., Maxion, R.: Why Did My Detector Do That?!: Predicting Keystroke-Dynamics Error Rates. In: Jha, S., Sommer, R., Kreibich, C. (eds.) RAID 2010. LNCS, vol.\u00a06307, pp. 256\u2013276. Springer, Heidelberg (2010)"},{"key":"10_CR21","doi-asserted-by":"publisher","first-page":"125","DOI":"10.1109\/DSN.2009.5270346","volume-title":"Proceedings of the 2009 IEEE\/IFIP International Conference on Dependable Systems and Networks, DSN 2009","author":"K.S. Killourhy","year":"2009","unstructured":"Killourhy, K.S., Maxion, R.A.: Comparing anomaly-detection algorithms for keystroke dynamics. In: Casimiro, A., de Lemos, R., Gacek, C. (eds.) Proceedings of the 2009 IEEE\/IFIP International Conference on Dependable Systems and Networks, DSN 2009, Lisbon, Portugal, pp. 125\u2013134. IEEE Computer Society Press, Los Alamitos (2009)"},{"key":"10_CR22","doi-asserted-by":"crossref","unstructured":"Maxion, R.A., Killourhy, K.S.: Keystroke biometrics with number-pad input. In: International Conference on Dependable Systems and Networks, pp. 201\u2013210 (2010)","DOI":"10.1109\/DSN.2010.5544311"},{"key":"10_CR23","doi-asserted-by":"publisher","first-page":"887","DOI":"10.1145\/1240624.1240758","volume-title":"Proceedings of the SIGCHI Conference on Human Factors in Computing Systems, CHI 2007","author":"W. Moncur","year":"2007","unstructured":"Moncur, W., Lepl\u00e2tre, G.: Pictures at the ATM: exploring the usability of multiple graphical passwords. In: Proceedings of the SIGCHI Conference on Human Factors in Computing Systems, CHI 2007, pp. 887\u2013894. ACM, New York (2007)"},{"key":"10_CR24","series-title":"CCIS","first-page":"286","volume-title":"ISA 2010","author":"M. Nauman","year":"2010","unstructured":"Nauman, M., Ali, T.: TOKEN: Trustable Keystroke-Based Authentication for Web-Based Applications on Smartphones. In: Bandyopadhyay, S.K., Adi, W., Kim, T.h., Xiao, Y. (eds.) ISA 2010. CCIS, vol.\u00a076, pp. 286\u2013297. Springer, Heidelberg (2010)"},{"key":"10_CR25","doi-asserted-by":"crossref","unstructured":"Nauman, M., Ali, T., Rauf, A.: Using trusted computing for privacy preserving keystroke-based authentication in smartphones. Telecommunication Systems, 1\u201313 (2011)","DOI":"10.1007\/s11235-011-9538-9"},{"key":"10_CR26","doi-asserted-by":"crossref","unstructured":"Nickel, C., Derawi, M.O., Bours, P., Busch, C.: Scenario test of accelerometer-based biometric gait recognition. In: 3rd International Workshop Security and Communication Networks (IWSCN), Gj\u00f8vik, Norway (2011)","DOI":"10.1109\/IWSCN.2011.6827712"},{"key":"10_CR27","doi-asserted-by":"publisher","first-page":"393","DOI":"10.1109\/TIFS.2010.2053706","volume":"5","author":"P.C. Oorschot van","year":"2010","unstructured":"van Oorschot, P.C., Salehi-Abari, A., Thorpe, J.: Purely automated attacks on passpoints-style graphical passwords. IEEE Transactions on Information Forensics and Security\u00a05, 393\u2013405 (2010)","journal-title":"IEEE Transactions on Information Forensics and Security"},{"key":"10_CR28","doi-asserted-by":"crossref","unstructured":"Perito, D., Castelluccia, C., K\u00e2afar, M.A., Manils, P.: How unique and traceable are usernames? CoRR abs\/1101.5578 (2011)","DOI":"10.1007\/978-3-642-22263-4_1"},{"key":"10_CR29","unstructured":"Safary Developer Library: Handling events (2011), http:\/\/developer.apple.com\/library\/safari\/#documentation\/appleapplications\/reference\/SafariWebContent\/HandlingEvents\/HandlingEvents.html#\/\/apple_ref\/doc\/uid\/TP40006511-SW1 (accessed October 27, 2011)"},{"key":"10_CR30","doi-asserted-by":"crossref","unstructured":"Salehi-Abari, A., Thorpe, J., van Oorschot, P.: On purely automated attacks and click-based graphical passwords. In: Computer Security Applications Conference, Annual, pp. 111\u2013120 (2008)","DOI":"10.1109\/ACSAC.2008.18"},{"key":"10_CR31","unstructured":"Trusted Computing Group: Mobile trusted module 2.0 - Use cases (March 2011), http:\/\/www.trustedcomputinggroup.org\/resources\/mobile_trusted_module_20_use_cases"},{"key":"10_CR32","doi-asserted-by":"publisher","first-page":"177","DOI":"10.1145\/1133265.1133303","volume-title":"Proceedings of the Working Conference on Advanced Visual Interfaces, AVI 2006","author":"S. Wiedenbeck","year":"2006","unstructured":"Wiedenbeck, S., Waters, J., Sobrado, L., Birget, J.C.: Design and evaluation of a shoulder-surfing resistant graphical password scheme. In: Proceedings of the Working Conference on Advanced Visual Interfaces, AVI 2006, pp. 177\u2013184. ACM, New York (2006)"},{"key":"10_CR33","series-title":"LNCS","first-page":"224","volume-title":"RAID 2009","author":"S. Zahid","year":"2009","unstructured":"Zahid, S., Shahzad, M., Khayam, S.A., Farooq, M.: Keystroke-Based User Identificationon Smart Phones. In: Kirda, E., Jha, S., Balzarotti, D. (eds.) RAID 2009. LNCS, vol.\u00a05758, pp. 224\u2013243. Springer, Heidelberg (2009)"},{"key":"10_CR34","series-title":"IFIP AICT","doi-asserted-by":"publisher","first-page":"247","DOI":"10.1007\/978-3-642-21424-0_20","volume-title":"Future Challenges in Security and Privacy for Academia and Industry","author":"G. Zhang","year":"2011","unstructured":"Zhang, G.: Analyzing Key-Click Patterns of PIN Input for Recognizing VoIP Users. In: Camenisch, J., Fischer-H\u00fcbner, S., Murayama, Y., Portmann, A., Rieder, C. (eds.) SEC 2011. IFIP AICT, vol.\u00a0354, pp. 247\u2013258. Springer, Heidelberg (2011)"}],"container-title":["IFIP Advances in Information and Communication Technology","Privacy and Identity Management for Life"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-31668-5_10.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,4,2]],"date-time":"2025-04-02T20:48:28Z","timestamp":1743626908000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-31668-5_10"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2012]]},"ISBN":["9783642316678","9783642316685"],"references-count":34,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-31668-5_10","relation":{},"ISSN":["1868-4238","1861-2288"],"issn-type":[{"type":"print","value":"1868-4238"},{"type":"electronic","value":"1861-2288"}],"subject":[],"published":{"date-parts":[[2012]]}}}