{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,28]],"date-time":"2025-10-28T14:52:10Z","timestamp":1761663130340,"version":"3.40.4"},"publisher-location":"Berlin, Heidelberg","reference-count":53,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642385186"},{"type":"electronic","value":"9783642385193"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2013]]},"DOI":"10.1007\/978-3-642-38519-3_21","type":"book-chapter","created":{"date-parts":[[2013,5,2]],"date-time":"2013-05-02T07:59:28Z","timestamp":1367481568000},"page":"331-350","source":"Crossref","is-referenced-by-count":62,"title":["Touch Gestures Based Biometric Authentication Scheme for Touchscreen Mobile Phones"],"prefix":"10.1007","author":[{"given":"Yuxin","family":"Meng","sequence":"first","affiliation":[]},{"given":"Duncan S.","family":"Wong","sequence":"additional","affiliation":[]},{"given":"Roman","family":"Schlegel","sequence":"additional","affiliation":[]},{"given":"Lam-for","family":"Kwok","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"issue":"3","key":"21_CR1","doi-asserted-by":"publisher","first-page":"165","DOI":"10.1109\/TDSC.2007.70207","volume":"4","author":"A.A.E. Ahmed","year":"2007","unstructured":"Ahmed, A.A.E., Traore, I.: A New Biometric Technology based on Mouse Dynamics. IEEE Transactions on Dependable and Secure Computing\u00a04(3), 165\u2013179 (2007)","journal-title":"IEEE Transactions on Dependable and Secure Computing"},{"issue":"4","key":"21_CR2","doi-asserted-by":"publisher","first-page":"367","DOI":"10.1145\/581271.581272","volume":"5","author":"F. Bergadano","year":"2002","unstructured":"Bergadano, F., Gunetti, D., Picardi, C.: User Authentication through Keystroke Dynamics. ACM Transactions on Information and System Security\u00a05(4), 367\u2013397 (2002)","journal-title":"ACM Transactions on Information and System Security"},{"issue":"4","key":"21_CR3","doi-asserted-by":"publisher","first-page":"579","DOI":"10.1162\/neco.1991.3.4.579","volume":"3","author":"C. Bishop","year":"1991","unstructured":"Bishop, C.: Improving the Generalization Properties of Radial Basis Function Neural Networks. Neural Computation\u00a03(4), 579\u2013588 (1991)","journal-title":"Neural Computation"},{"issue":"12","key":"21_CR4","doi-asserted-by":"publisher","first-page":"1217","DOI":"10.1109\/34.62613","volume":"12","author":"S. Bleha","year":"1990","unstructured":"Bleha, S., Slivinsky, C., Hussien, B.: Computer-access Security Systems Using Keystroke Dynamics. IEEE Transactions on Pattern Analysis and Machine Intelligence\u00a012(12), 1217\u20131222 (1990)","journal-title":"IEEE Transactions on Pattern Analysis and Machine Intelligence"},{"issue":"7","key":"21_CR5","doi-asserted-by":"publisher","first-page":"519","DOI":"10.1016\/j.cose.2005.08.003","volume":"24","author":"N.L. Clarke","year":"2005","unstructured":"Clarke, N.L., Furnell, S.M.: Telephones -A Survey of Attitudes and Practices. Computers & Security\u00a024(7), 519\u2013527 (2005)","journal-title":"Computers & Security"},{"issue":"1","key":"21_CR6","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/s10207-006-0006-6","volume":"6","author":"N.L. Clarke","year":"2007","unstructured":"Clarke, N.L., Furnell, S.M.: Authenticating Mobile Phone Users Using Keystroke Analysis. International Journal of Information Security\u00a06(1), 1\u201314 (2007)","journal-title":"International Journal of Information Security"},{"key":"21_CR7","doi-asserted-by":"crossref","unstructured":"Cleary, J.G., Trigg, L.E.: K*: An Instance-based Learner Using an Entropic Distance Measure. In: Proceedings of the 12th International Conference on Machine Learning, pp. 108\u2013114. Morgan Kaufmann (1995)","DOI":"10.1016\/B978-1-55860-377-6.50022-0"},{"issue":"5","key":"21_CR8","doi-asserted-by":"publisher","first-page":"945","DOI":"10.1109\/TPAMI.2010.164","volume":"33","author":"J. Dai","year":"2011","unstructured":"Dai, J., Zhou, J.: Multifeature-based high-Resolution Palmprint Recognition. IEEE Transactions on Pattern Analysis and Machine Intelligence\u00a033(5), 945\u2013957 (2011)","journal-title":"IEEE Transactions on Pattern Analysis and Machine Intelligence"},{"key":"21_CR9","doi-asserted-by":"publisher","first-page":"987","DOI":"10.1145\/2207676.2208544","volume-title":"Proceedings of the 2012 ACM Annual Conference on Human Factors in Computing Systems (CHI)","author":"A. Luca De","year":"2012","unstructured":"De Luca, A., Hang, A., Brudy, F., Lindner, C., Hussmann, H.: Touch Me Once and I Know It\u2019s You!: Implicit Authentication based on Touch Screen Patterns. In: Proceedings of the 2012 ACM Annual Conference on Human Factors in Computing Systems (CHI), pp. 987\u2013996. ACM, New York (2012)"},{"issue":"2","key":"21_CR10","doi-asserted-by":"publisher","first-page":"222","DOI":"10.1109\/TSE.1987.232894","volume":"13","author":"D.E. Denning","year":"1987","unstructured":"Denning, D.E.: An Intrusion-Detection Model. IEEE Transactions on Software Engineering\u00a013(2), 222\u2013232 (1987)","journal-title":"IEEE Transactions on Software Engineering"},{"key":"21_CR11","unstructured":"Fahlman, S.E.: An Empirical Study of Learning Speed in Back-propagation Networks. Technical Report CMU-CS-88-162, Carnegie Mellon University, Pittsburgh, PA 15213 (1988)"},{"issue":"1","key":"21_CR12","doi-asserted-by":"publisher","first-page":"3","DOI":"10.1007\/s12193-009-0034-4","volume":"4","author":"D. Fiorella","year":"2010","unstructured":"Fiorella, D., Sanna, A., Lamberti, F.: Multi-touch User Interface Evaluation for 3D Object Manipulation on Mobile Devices. Journal on Multimodal User Interfaces\u00a04(1), 3\u201310 (2010)","journal-title":"Journal on Multimodal User Interfaces"},{"key":"21_CR13","unstructured":"Jermyn, I., Mayer, A., Monrose, F., Reiter, M.K., Rubin, A.D.: The Design and Analysis of Graphical Passwords. In: Proceedings of the 8th USENIX Security Symposium, pp. 1\u201315. USENIX Association (1999)"},{"key":"21_CR14","doi-asserted-by":"crossref","unstructured":"Jorgensen, Z., Yu, T.: On Mouse Dynamics as a Behavioral Biometric for Authentication. In: Proceedings of the 6th ACM Symposium on Information, Computer and Communications Security (ASIACCS), New York, USA, pp. 476\u2013482 (2011)","DOI":"10.1145\/1966913.1966983"},{"key":"21_CR15","series-title":"IFIP","doi-asserted-by":"publisher","first-page":"253","DOI":"10.1007\/978-0-387-72367-9_22","volume-title":"New Approaches for Security, Privacy and Trust in Complex Environments","author":"S. Karatzouni","year":"2007","unstructured":"Karatzouni, S., Clarke, N.: Keystroke Analysis for Thumb-based Keyboards on Mobile Devices. In: Venter, H., Elofif, M., Labuschagne, L., Elofif, J., von Solms, R. (eds.) New Approaches for Security, Privacy and Trust in Complex Environments. IFIP, vol.\u00a0232, pp. 253\u2013263. Springer, Boston (2007)"},{"key":"21_CR16","doi-asserted-by":"publisher","first-page":"1647","DOI":"10.1145\/1518701.1518953","volume-title":"Proceedings of the 27th International Conference on Human Factors in Computing Systems (CHI)","author":"A.K. Karlson","year":"2009","unstructured":"Karlson, A.K., Brush, A.B., Schechter, S.: Can I Borrow Your Phone?: Understanding Concerns When Sharing Mobile Phones. In: Proceedings of the 27th International Conference on Human Factors in Computing Systems (CHI), pp. 1647\u20131650. ACM, New York (2009)"},{"key":"21_CR17","doi-asserted-by":"crossref","unstructured":"Kennedy, J., Eberhart, R.: Particle Swarm Optimization. In: Proceedings of the 1995 IEEE International Conference on Neural Networks, pp. 1942\u20131948 (1995)","DOI":"10.1109\/ICNN.1995.488968"},{"key":"21_CR18","doi-asserted-by":"publisher","first-page":"1093","DOI":"10.1145\/1753326.1753489","volume-title":"Proceedings of the 28th International Conference on Human Factors in Computing Systems (CHI)","author":"D. Kim","year":"2010","unstructured":"Kim, D., Dunphy, P., Briggs, P., Hook, J., Nicholson, J.W., Nicholson, J., Olivier, P.: Multi-Touch Authentication on Tabletops. In: Proceedings of the 28th International Conference on Human Factors in Computing Systems (CHI), pp. 1093\u20131102. ACM, New York (2010)"},{"issue":"11","key":"21_CR19","first-page":"13670","volume":"38","author":"C. K\u00f6se","year":"2011","unstructured":"K\u00f6se, C., \u0130kiba\u015f, C.: A Personal Identification System using Retinal Vasculature in Retinal Fundus Images. Expert Systems with Applications\u00a038(11), 13670\u201313681 (2011)","journal-title":"Expert Systems with Applications"},{"issue":"6","key":"21_CR20","doi-asserted-by":"publisher","first-page":"859","DOI":"10.1016\/S0020-7373(05)80165-8","volume":"35","author":"J. Leggett","year":"1991","unstructured":"Leggett, J., Williams, G., Usnick, M., Longnecker, M.: Dynamic Identity Verification via Keystroke Characteristics. International Journal of Man-Machine Studies\u00a035(6), 859\u2013870 (1991)","journal-title":"International Journal of Man-Machine Studies"},{"key":"21_CR21","unstructured":"Lemos, R.: Passwords: the Weakest Link? Hackers can Crack most in less than a Minute (May 2002), http:\/\/news.com\/2009-1001-916719.html"},{"key":"21_CR22","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"317","DOI":"10.1007\/978-3-540-28647-9_54","volume-title":"Advances in Neural Networks \u2013 ISNN 2004","author":"Y. Liu","year":"2004","unstructured":"Liu, Y., Zheng, Q., Shi, Z., Chen, J.: Training Radial Basis Function Networks with Particle Swarms. In: Yin, F.-L., Wang, J., Guo, C. (eds.) ISNN 2004. LNCS, vol.\u00a03173, pp. 317\u2013322. Springer, Heidelberg (2004)"},{"issue":"3","key":"21_CR23","doi-asserted-by":"publisher","first-page":"402","DOI":"10.1109\/34.990140","volume":"24","author":"D. Maio","year":"2002","unstructured":"Maio, D., Maltoni, D., Wayman, J.L., Jain, A.K.: Fvc2000: Fingerprint Verification Competition. IEEE Transactions on Pattern Analysis and Machine Intelligence\u00a024(3), 402\u2013412 (2002)","journal-title":"IEEE Transactions on Pattern Analysis and Machine Intelligence"},{"key":"21_CR24","doi-asserted-by":"publisher","first-page":"21","DOI":"10.1145\/1982185.1982190","volume-title":"Proceedings of the 2011 ACM Symposium on Applied Computing (SAC)","author":"E. Maiorana","year":"2011","unstructured":"Maiorana, E., Campisi, P., Gonz\u00e1lez-Carballo, N., Neri, A.: Keystroke Dynamics Authentication for Mobile Phones. In: Proceedings of the 2011 ACM Symposium on Applied Computing (SAC), pp. 21\u201326. ACM, New York (2011)"},{"issue":"3","key":"21_CR25","doi-asserted-by":"publisher","first-page":"45","DOI":"10.1109\/MSECP.2003.1203221","volume":"1","author":"V. Maty\u00e1s Jr.","year":"2003","unstructured":"Maty\u00e1s Jr., V., Riha, Z.: Toward Reliable User Authentication through Biometrics. IEEE Security and Privacy\u00a01(3), 45\u201349 (2003)","journal-title":"IEEE Security and Privacy"},{"key":"21_CR26","unstructured":"McAfee and Carnegie Mellon University. Mobility and Security: Dazzling Opportunities, profound challenges (May 2011), http:\/\/www.mcafee.com\/mobilesecurityreport"},{"issue":"1","key":"21_CR27","doi-asserted-by":"crossref","first-page":"14","DOI":"10.1007\/s102070100001","volume":"1","author":"J. McHugh","year":"2001","unstructured":"McHugh, J.: Intrusion and Intrusion Detection. International Journal of Information Security\u00a01(1), 14\u201335 (2001)","journal-title":"International Journal of Information Security"},{"key":"21_CR28","unstructured":"Millennial Media. Mobile mix: The mobile device index (2011), http:\/\/www.millennialmedia.com\/research"},{"key":"21_CR29","unstructured":"N. Mobile and NCSA. Report on Consumer Behaviors and Perceptions of Mobile Security (January 2012), http:\/\/docs.nq.com\/NQ_Mobile_Security_Survey_Jan2012.pdf"},{"issue":"2","key":"21_CR30","doi-asserted-by":"publisher","first-page":"69","DOI":"10.1007\/s102070100006","volume":"1","author":"F. Monrose","year":"2002","unstructured":"Monrose, F., Reiter, M.K., Wetzel, S.: Password Hardening based on Keystroke Dynamics. International Journal of Information Security\u00a01(2), 69\u201383 (2002)","journal-title":"International Journal of Information Security"},{"key":"21_CR31","first-page":"48","volume-title":"Proceedings of the 4th ACM Conference on Computer and Communications Security (CCS)","author":"F. Monrose","year":"1997","unstructured":"Monrose, F., Rubin, A.: Authentication via Keystroke Dynamics. In: Proceedings of the 4th ACM Conference on Computer and Communications Security (CCS), pp. 48\u201356. ACM, New York (1997)"},{"issue":"4","key":"21_CR32","doi-asserted-by":"publisher","first-page":"351","DOI":"10.1016\/S0167-739X(99)00059-X","volume":"16","author":"F. Monrose","year":"2000","unstructured":"Monrose, F., Rubin, A.: Keystroke Dynamics as a Biometric for Authentication. Future Generation Computer Systems\u00a016(4), 351\u2013359 (2000)","journal-title":"Future Generation Computer Systems"},{"issue":"6","key":"21_CR33","doi-asserted-by":"publisher","first-page":"1345","DOI":"10.1109\/TSMCA.2010.2052602","volume":"40","author":"Y. Nakkabi","year":"2010","unstructured":"Nakkabi, Y., Traor\u00e9, I., Ahmed, A.A.E.: Improving Mouse Dynamics Biometric Performance using Variance Reduction via Extractors with Separate Features. IEEE Transactions on Systems, Man, and Cybernetics, Part A\u00a040(6), 1345\u20131353 (2010)","journal-title":"IEEE Transactions on Systems, Man, and Cybernetics, Part A"},{"key":"21_CR34","doi-asserted-by":"crossref","unstructured":"Nauman, M., Ali, T., Rauf, A.: Using Trusted Computing for Privacy Preserving Keystroke-based Authentication in Smartphones. Telecommunication Systems, 1\u201313 (2011)","DOI":"10.1007\/s11235-011-9538-9"},{"key":"21_CR35","doi-asserted-by":"crossref","unstructured":"Numabe, Y., Nonaka, H., Yoshikawa, T.: Finger Identification for Touch Panel Operation using Tapping Fluctuation. In: Proceedings of the IEEE 13th International Symposium on Consumer Electronics, pp. 899\u2013902 (May 2009)","DOI":"10.1109\/ISCE.2009.5156942"},{"key":"21_CR36","unstructured":"Orr, M.J.L.: Introduction to Radial Basis Function Networks (1996)"},{"issue":"4","key":"21_CR37","doi-asserted-by":"publisher","first-page":"981","DOI":"10.1109\/36.406684","volume":"33","author":"J.D. Paola","year":"1995","unstructured":"Paola, J.D., Schowengerdt, R.A.: A Detailed Comparison of Backpropagation Neural Network and Maximum-likelihood Classifiers for Urban Land Use Classification. IEEE Transactions on Geoscience and Remote Sensing\u00a033(4), 981\u2013996 (1995)","journal-title":"IEEE Transactions on Geoscience and Remote Sensing"},{"key":"21_CR38","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/1029208.1029210","volume-title":"Proceedings of the 2004 ACM Workshop on Visualization and Data Mining for Computer Security (VizSEC\/DMSEC)","author":"M. Pusara","year":"2004","unstructured":"Pusara, M., Brodley, C.E.: User Re-Authentication via Mouse Movements. In: Proceedings of the 2004 ACM Workshop on Visualization and Data Mining for Computer Security (VizSEC\/DMSEC), pp. 1\u20138. ACM, New York (2004)"},{"key":"21_CR39","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"19","DOI":"10.1007\/978-3-642-01513-7_3","volume-title":"Advances in Neural Networks \u2013 ISNN 2009","author":"S.N. Qasem","year":"2009","unstructured":"Qasem, S.N., Shamsuddin, S.M.: Hybrid Learning Enhancement of RBF Network based on Particle Swarm Optimization. In: Yu, W., He, H., Zhang, N. (eds.) ISNN 2009, Part III. LNCS, vol.\u00a05553, pp. 19\u201329. Springer, Heidelberg (2009)"},{"key":"21_CR40","volume-title":"C4.5: Programs for Machine Learning","author":"J.R. Quinlan","year":"1993","unstructured":"Quinlan, J.R.: C4.5: Programs for Machine Learning. Morgan Kaufmann Publishers Inc., San Francisco (1993)"},{"issue":"1","key":"21_CR41","doi-asserted-by":"crossref","first-page":"77","DOI":"10.1613\/jair.279","volume":"4","author":"J.R. Quinlan","year":"1996","unstructured":"Quinlan, J.R.: Improved Use of Continuous Attributes in C4.5. Journal of Artificial Intelligence Research\u00a04(1), 77\u201390 (1996)","journal-title":"Journal of Artificial Intelligence Research"},{"key":"21_CR42","unstructured":"Rennie, J.D.M., Shih, L., Teevan, J., Karger, D.R.: Tackling the Poor Assumptions of Naive Bayes Text Classifiers. In: Proceedings of the 20th International Conference on Machine Learning, pp. 616\u2013623 (2003)"},{"key":"21_CR43","unstructured":"Rish, I.: An Empirical Study of the Naive Bayes Classifier. In: Proceedings of IJCAI 2001 Workshop on Empirical Methods in AI, pp. 41\u201346 (2001)"},{"issue":"2","key":"21_CR44","doi-asserted-by":"publisher","first-page":"236","DOI":"10.1109\/3468.661150","volume":"28","author":"J.A. Robinson","year":"1998","unstructured":"Robinson, J.A., Liang, V.W., Chambers, J.A.M., MacKenzie, C.L.: Computer User Verification using Login String Keystroke Dynamics. IEEE Transactions on Systems, Man, and Cybernetics, Part A\u00a028(2), 236\u2013241 (1998)","journal-title":"IEEE Transactions on Systems, Man, and Cybernetics, Part A"},{"issue":"2","key":"21_CR45","doi-asserted-by":"publisher","first-page":"154","DOI":"10.1109\/TIFS.2006.873603","volume":"1","author":"N.A. Schmid","year":"2006","unstructured":"Schmid, N.A., Ketkar, M.V., Singh, H., Cukic, B.: Performance Analysis of Iris-based Identification System at the Matching Score Level. IEEE Transactions on Information Forensics and Security\u00a01(2), 154\u2013168 (2006)","journal-title":"IEEE Transactions on Information Forensics and Security"},{"issue":"2","key":"21_CR46","doi-asserted-by":"publisher","first-page":"35","DOI":"10.1109\/MSP.2010.2","volume":"8","author":"A. Shabtai","year":"2010","unstructured":"Shabtai, A., Fledel, Y., Kanonov, U., Elovici, Y., Dolev, S., Glezer, C.: Google Android: A Comprehensive Security Assessment. IEEE Security Privacy\u00a08(2), 35\u201344 (2010)","journal-title":"IEEE Security Privacy"},{"key":"21_CR47","doi-asserted-by":"publisher","first-page":"56","DOI":"10.1145\/1143120.1143128","volume-title":"Proceedings of the 2nd Symposium on Usable Privacy and Security (SOUPS)","author":"F. Tari","year":"2006","unstructured":"Tari, F., Ozok, A.A., Holden, S.H.: A Comparison of Perceived and Real Shoulder-Surfing Risks between Alphanumeric and Graphical Passwords. In: Proceedings of the 2nd Symposium on Usable Privacy and Security (SOUPS), pp. 56\u201366. ACM, New York (2006)"},{"key":"21_CR48","unstructured":"The University of Waikato. WEKA-Waikato Environment for Knowledge Analysis, http:\/\/www.cs.waikato.ac.nz\/ml\/weka\/"},{"issue":"2","key":"21_CR49","doi-asserted-by":"publisher","first-page":"553","DOI":"10.1109\/TIFS.2012.2184095","volume":"7","author":"R. Wallace","year":"2012","unstructured":"Wallace, R., McLaren, M., McCool, C., Marcel, S.: Cross-pollination of Normalisation Techniques from Speaker to Face Authentication using Gaussian Mixture Models. IEEE Transactions on Information Forensics and Security\u00a07(2), 553\u2013562 (2012)","journal-title":"IEEE Transactions on Information Forensics and Security"},{"key":"21_CR50","doi-asserted-by":"publisher","first-page":"383","DOI":"10.1145\/1463160.1463202","volume-title":"Proceedings of the 5th Nordic Conference on Human-Computer Interaction: Building Bridges (NordiCHI)","author":"R. Weiss","year":"2008","unstructured":"Weiss, R., De Luca, A.: Passshapes: Utilizing Stroke based Authentication to Increase Password Memorability. In: Proceedings of the 5th Nordic Conference on Human-Computer Interaction: Building Bridges (NordiCHI), pp. 383\u2013392. ACM, New York (2008)"},{"issue":"9","key":"21_CR51","doi-asserted-by":"publisher","first-page":"1423","DOI":"10.1109\/5.784219","volume":"87","author":"X. Yao","year":"1999","unstructured":"Yao, X.: Evolving Artificial Neural Networks. Proceedings of the IEEE\u00a087(9), 1423\u20131447 (1999)","journal-title":"Proceedings of the IEEE"},{"key":"21_CR52","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"224","DOI":"10.1007\/978-3-642-04342-0_12","volume-title":"Recent Advances in Intrusion Detection","author":"S. Zahid","year":"2009","unstructured":"Zahid, S., Shahzad, M., Khayam, S.A., Farooq, M.: Keystroke-Based User Identification on Smart Phones. In: Kirda, E., Jha, S., Balzarotti, D. (eds.) RAID 2009. LNCS, vol.\u00a05758, pp. 224\u2013243. Springer, Heidelberg (2009)"},{"key":"21_CR53","doi-asserted-by":"publisher","first-page":"139","DOI":"10.1145\/2046707.2046725","volume-title":"Proceedings of the 18th ACM Conference on Computer and Communications Security (CCS)","author":"N. Zheng","year":"2011","unstructured":"Zheng, N., Paloski, A., Wang, H.: An Efficient User Verification System via Mouse Movements. In: Proceedings of the 18th ACM Conference on Computer and Communications Security (CCS), pp. 139\u2013150. ACM, New York (2011)"}],"container-title":["Lecture Notes in Computer Science","Information Security and Cryptology"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-38519-3_21","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,4,30]],"date-time":"2025-04-30T07:58:00Z","timestamp":1745999880000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-38519-3_21"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2013]]},"ISBN":["9783642385186","9783642385193"],"references-count":53,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-38519-3_21","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2013]]}}}