{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,18]],"date-time":"2025-11-18T12:15:27Z","timestamp":1763468127274,"version":"3.40.3"},"publisher-location":"Berlin, Heidelberg","reference-count":14,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642394539"},{"type":"electronic","value":"9783642394546"}],"license":[{"start":{"date-parts":[[2013,1,1]],"date-time":"2013-01-01T00:00:00Z","timestamp":1356998400000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2013]]},"DOI":"10.1007\/978-3-642-39454-6_84","type":"book-chapter","created":{"date-parts":[[2013,6,12]],"date-time":"2013-06-12T00:54:13Z","timestamp":1370998453000},"page":"783-791","source":"Crossref","is-referenced-by-count":17,"title":["Behavioral Biometric Identification on Mobile Devices"],"prefix":"10.1007","author":[{"given":"Matt","family":"Wolff","sequence":"first","affiliation":[]}],"member":"297","reference":[{"unstructured":"Mcafee, McAfee Threats Report: Second Quarter 2011 (2011)","key":"84_CR1"},{"unstructured":"Boyle, M., Klausner, A., Starobinski, D., Trachtenberg, A., Wu, H.: Gait-based User Classification Using Phone Sensors. ipsit.bu.edu, pp. 395\u2013396, \n                    \n                      http:\/\/ipsit.bu.edu\/documents\/mobisys11.pdf","key":"84_CR2"},{"unstructured":"Mantyjarvi, J., Lindholm, M., Vildjiounaite, E., Makela, S., Ailisto, H.: Identifying users of portable devices from gait pattern with accelerometers. In: IEEE International Conference on Acoustics, Speech, and Signal Processing, Proceedings(ICASSP 2005), vol.\u00a02, pp. ii\u2013973. IEEE (2005), \n                    \n                      http:\/\/ieeexplore.ieee.org\/xpls\/abs_all.jsp?arnumber=1415569","key":"84_CR3"},{"issue":"7","key":"84_CR4","doi-asserted-by":"publisher","first-page":"51","DOI":"10.4304\/jcp.1.7.51-59","volume":"1","author":"D. Gafurov","year":"2006","unstructured":"Gafurov, D., Helkala, K., S\u00f8ndrol, T.: Biometric Gait Authentication Using Accelerometer Sensor. Journal of Computers\u00a01(7), 51\u201359 (2006), \n                    \n                      http:\/\/academypublisher.com\/ojs\/index.php\/jcp\/article\/view\/277","journal-title":"Journal of Computers"},{"key":"84_CR5","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1155\/2009\/415817","volume":"2009","author":"D. Gafurov","year":"2009","unstructured":"Gafurov, D., Snekkenes, E.: Gait Recognition Using Wearable Motion Recording Sensors. EURASIP Journal on Advances in Signal Processing\u00a02009, 1\u201317 (2009), \n                    \n                      http:\/\/www.hindawi.com\/journals\/asp\/2009\/415817.html","journal-title":"EURASIP Journal on Advances in Signal Processing"},{"doi-asserted-by":"crossref","unstructured":"B\u00e4chlin, M., Schumm, J., Roggen, D., T\u00f6ster, G.: Quantifying gait similarity: User authentication and real-world challenge. Advances in Biometrics, 1040\u20131049 (2009), \n                    \n                      http:\/\/www.springerlink.com\/index\/WJ43150286835587.pdf","key":"84_CR6","DOI":"10.1007\/978-3-642-01793-3_105"},{"unstructured":"Ketabdar, H., Roshandel, M., Skripko, D.: Towards Implicit Enhancement of Security and User Authentication in Mobile Devices Based on Movement and Audio Analysis. Interactions, 188\u2013191 (2011)","key":"84_CR7"},{"unstructured":"Kwapisz, J., Weiss, G., Moore, S.: Cell phone-based biometric identification. In: 2010 Fourth IEEE International Conference on Biometrics: Theory Applications and Systems (BTAS), pp. 1\u20137. IEEE (2010), \n                    \n                      http:\/\/ieeexplore.ieee.org\/xpls\/abs_all.jsp?arnumber=5634532","key":"84_CR8"},{"key":"84_CR9","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"151","DOI":"10.1007\/978-3-642-01516-8_11","volume-title":"Pervasive Computing","author":"K.-h. Chang","year":"2009","unstructured":"Chang, K.-h., Hightower, J., Kveton, B.: Inferring identity using accelerometers in television remote controls. In: Tokuda, H., Beigl, M., Friday, A., Brush, A.J.B., Tobe, Y. (eds.) Pervasive 2009. LNCS, vol.\u00a05538, pp. 151\u2013167. Springer, Heidelberg (2009)"},{"key":"84_CR10","first-page":"1","volume":"6","author":"N.L.C.S.M. Furnell","year":"2007","unstructured":"Furnell, N.L.C.S.M.: Authenticating mobile phone users using keystroke analysis. International Journal of Information Security\u00a06, 1\u201314 (2007)","journal-title":"International Journal of Information Security"},{"unstructured":"Zahid, S., Shahzad, M., Khayam, S.A., Farooq, M.: Keystroke-based User Identification on Smart Phones. Technology, 1\u201318","key":"84_CR11"},{"issue":"1-2","key":"84_CR12","doi-asserted-by":"publisher","first-page":"85","DOI":"10.1016\/j.cose.2008.10.002","volume":"28","author":"S. Hwang","year":"2009","unstructured":"Hwang, S., Cho, S., Park, S.: Keystroke dynamics-based authentication for mobile devices. Computers Security\u00a028(1-2), 85\u201393 (2009), \n                    \n                      http:\/\/linkinghub.elsevier.com\/retrieve\/pii\/S0167404808000965","journal-title":"Computers Security"},{"doi-asserted-by":"crossref","unstructured":"Maiorana, E., Campisi, P., Gonz\u00e1lez-carballo, N., Neri, A.: Keystroke Dynamics Authentication for Mobile Phones. In: SAC, pp. 21\u201326 (2011)","key":"84_CR13","DOI":"10.1145\/1982185.1982190"},{"doi-asserted-by":"crossref","unstructured":"Saevanee, H., Bhattarakosol, P.: Authenticating user using keystroke dynamics and finger pressure. In: Identity, pp. 1\u20132 (2009)","key":"84_CR14","DOI":"10.1109\/CCNC.2009.4784783"}],"container-title":["Lecture Notes in Computer Science","Foundations of Augmented Cognition"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-39454-6_84","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,2,22]],"date-time":"2020-02-22T21:59:42Z","timestamp":1582408782000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-39454-6_84"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2013]]},"ISBN":["9783642394539","9783642394546"],"references-count":14,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-39454-6_84","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2013]]}}}