{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,7,2]],"date-time":"2025-07-02T22:43:06Z","timestamp":1751496186763},"publisher-location":"Berlin, Heidelberg","reference-count":19,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642409240"},{"type":"electronic","value":"9783642409257"}],"license":[{"start":{"date-parts":[[2013,1,1]],"date-time":"2013-01-01T00:00:00Z","timestamp":1356998400000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2013]]},"DOI":"10.1007\/978-3-642-40925-7_5","type":"book-chapter","created":{"date-parts":[[2013,9,19]],"date-time":"2013-09-19T11:54:58Z","timestamp":1379591698000},"page":"47-58","source":"Crossref","is-referenced-by-count":11,"title":["User Authentication for Mobile Devices"],"prefix":"10.1007","author":[{"given":"Marcin","family":"Rogowski","sequence":"first","affiliation":[]},{"given":"Khalid","family":"Saeed","sequence":"additional","affiliation":[]},{"given":"Mariusz","family":"Rybnik","sequence":"additional","affiliation":[]},{"given":"Marek","family":"Tabedzki","sequence":"additional","affiliation":[]},{"given":"Marcin","family":"Adamski","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"5_CR1","unstructured":"Allen, M.: A day in the life of mobile data. In: Mobile Security. British Computer Society (2005), \n                    \n                      http:\/\/www.bcs.org\/server.php?show=conWebDoc.2774\n                    \n                    \n                   (accessed May 14, 2012)"},{"key":"5_CR2","doi-asserted-by":"crossref","unstructured":"Derawi, M.O., Nickel, C., Bours, P., Busch, C.: Unobtrusive User-Authentication on Mobile Phones Using Biometric Gait Recognition. In: Sixth International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP), pp. 306\u2013311 (2010), doi:10.1109\/IIHMSP.2010.83","DOI":"10.1109\/IIHMSP.2010.83"},{"key":"5_CR3","volume-title":"Perfect Passwords","author":"M. Burnett","year":"2005","unstructured":"Burnett, M., Kleiman, D.: Perfect Passwords. Syngress, Rock-land (2005)"},{"key":"5_CR4","doi-asserted-by":"crossref","unstructured":"Ivan, A., Goodfellow, J.: Improvements in or relating to Customer-Operated Dispensing Systems. UK Patent #GB1197183 (1966), doi:10.1049\/el:19650200","DOI":"10.1049\/el:19650200"},{"key":"5_CR5","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"25","DOI":"10.1007\/978-3-642-32946-3_3","volume-title":"Financial Cryptography and Data Security","author":"J. Bonneau","year":"2012","unstructured":"Bonneau, J., Preibusch, S., Anderson, R.: A birthday present every eleven wallets? The security of customer-chosen banking PINs. In: Keromytis, A.D. (ed.) FC 2012. LNCS, vol.\u00a07397, pp. 25\u201340. Springer, Heidelberg (2012), \n                    \n                      http:\/\/www.cl.cam.ac.uk\/~jcb82\/doc\/BPA12-FC-banking_pin_security.pdf\n                    \n                    \n                   (accessed May 14, 2012)"},{"key":"5_CR6","unstructured":"Aviv, A.J., Gibson, K., Mossop, E., Blaze, M., Smith, J.M.: Smudge Attacks on Smartphone Touch Screens. In: Workshop on Offensive Technology (2010), \n                    \n                      http:\/\/static.usenix.org\/event\/woot10\/tech\/full_papers\/Aviv.pdf\n                    \n                    \n                   (accessed May 14, 2012)"},{"key":"5_CR7","unstructured":"Whisper Systems WhisperCore, \n                    \n                      http:\/\/whispersys.com\/screenlock.html\n                    \n                    \n                   (accessed May 14, 2012)"},{"key":"5_CR8","unstructured":"Citty, J., Tapi, D.R.H.: Touch-screen authentication using partitioned images. Elon University Technical Report (2010), \n                    \n                      http:\/\/facstaff.elon.edu\/dhutchings\/papers\/citty2010tapi.pdf\n                    \n                    \n                   (accessed May 15, 2012)"},{"issue":"2","key":"5_CR9","first-page":"88","volume":"2","author":"A.S. Tolba","year":"2006","unstructured":"Tolba, A.S., El-baz, A.H., El-harby, A.A.: Face Recognition: A Literature Review. International Journal of Signal Processing\u00a02(2), 88\u2013103 (2006)","journal-title":"International Journal of Signal Processing"},{"key":"5_CR10","doi-asserted-by":"crossref","unstructured":"Spillane, R.: Keyboard Apparatus for Personal Identification. IBM Technical Disclosure Bulletin 17(3346) (1975), doi:10.1109\/MSP.2004.89","DOI":"10.1109\/MSP.2004.89"},{"key":"5_CR11","series-title":"IFIP","first-page":"253","volume-title":"SEC 2007","author":"S. Karatzouni","year":"2007","unstructured":"Karatzouni, S., Clarke, N.: Keystroke Analysis for Thumb-based Keyboards on Mobile Devices. In: Venter, H., Eloff, M., Labuschagne, L., von Eloff, J., Solms, R. (eds.) SEC 2007. IFIP, vol.\u00a0232, pp. 253\u2013263. Springer, Boston (2007)"},{"key":"5_CR12","doi-asserted-by":"crossref","unstructured":"Rybnik, M., Tab\u0119dzki, M., Saeed, K.: A Keystroke Dynamics Based System for User Identification. In: Proceedings of the 7th International Conference on Computer Information Systems and Industrial Management Applications: CISIM 2008, pp. 225\u2013230. IEEE Computer Society (2008), doi:10.1109\/CISIM.2008.8","DOI":"10.1109\/CISIM.2008.8"},{"key":"5_CR13","unstructured":"Loy, C.C., Lim, C.P., Lai, W.K.: Pressure-based Typing Biometrics User Authentication using the Fuzzy ARTMAP. In: Neural Network International Conference on Neural Information Processing (2005), \n                    \n                      http:\/\/www.eecs.qmul.ac.uk\/~ccloy\/files\/iconip_2005.pdf\n                    \n                    \n                   (accessed May 14, 2012)"},{"key":"5_CR14","doi-asserted-by":"publisher","first-page":"977","DOI":"10.1145\/2207676.2208543","volume-title":"Proceedings of the 2012 ACM Annual Conference on Human Factors in Computing Systems (CHI 2012)","author":"N. Sae-Bae","year":"2012","unstructured":"Sae-Bae, N., Ahmed, K., Isbister, K., Memon, N.: Biometric-rich gestures: a novel approach to authentication on multi-touch devices. In: Proceedings of the 2012 ACM Annual Conference on Human Factors in Computing Systems (CHI 2012), pp. 977\u2013986. ACM, New York (2012), doi:10.1145\/2207676.2208543"},{"key":"5_CR15","unstructured":"Hashia, S., Pollet, C., Stamp, M., Hall, M.Q.: On Using Mouse Movements As a Biometric. In: Proceedings of the International Conference on Computer Science and its Applications (2005), \n                    \n                      http:\/\/www.cs.sjsu.edu\/faculty\/pollett\/papers\/shivanipaper.pdf\n                    \n                    \n                   (accessed May 15, 2012)"},{"key":"5_CR16","unstructured":"Tab\u0119dzki, M., Saeed, K.: New Method to Test Mouse Movement Dynamics for Human Identification. In: KBIB 2005 Conference, Tom I, Computer Science Telemedicine Systems, pp. 467\u2013472. Czestochowa Technical University Press, Poland (2005) (in Polish), \n                    \n                      http:\/\/home.agh.edu.pl\/~saeed\/arts\/2005%20KBIB.pdf\n                    \n                    \n                   (accessed May 15, 2012)"},{"key":"5_CR17","unstructured":"Myers, L.: An Exploration of Voice Biometrics. GSEC Practical Assignment (2004), \n                    \n                      http:\/\/www.sans.org\/reading_room\/whitepapers\/authentication\/exploration-voice-biometrics_1436\n                    \n                    \n                   (accessed May 15, 2012)"},{"key":"5_CR18","doi-asserted-by":"publisher","first-page":"987","DOI":"10.1145\/2207676.2208544","volume-title":"Proceedings of the 2012 ACM Annual Conference on Human Factors in Computing Systems (CHI 2012)","author":"A. Luca De","year":"2012","unstructured":"De Luca, A., Hang, A., Brudy, F., Lindner, C., Hussmann, H.: Touch me once and I know it\u2019s you!: implicit authentication based on touch screen patterns. In: Proceedings of the 2012 ACM Annual Conference on Human Factors in Computing Systems (CHI 2012), pp. 987\u2013996. ACM, New York (2012), doi:10.1145\/2207676.2208544"},{"key":"5_CR19","doi-asserted-by":"publisher","first-page":"289","DOI":"10.1145\/958432.958485","volume-title":"Proceedings of the 5th International Conference on Multimodal Interfaces (ICMI 2003)","author":"T.J. Hazen","year":"2003","unstructured":"Hazen, T.J., Weinstein, E., Park, A.: Towards robust person recognition on handheld devices using face and speaker identification technologies. In: Proceedings of the 5th International Conference on Multimodal Interfaces (ICMI 2003), pp. 289\u2013292. ACM, New York (2003), doi:10.1145\/958432.958485"}],"container-title":["Lecture Notes in Computer Science","Computer Information Systems and Industrial Management"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-40925-7_5","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,17]],"date-time":"2019-05-17T08:01:40Z","timestamp":1558080100000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-40925-7_5"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2013]]},"ISBN":["9783642409240","9783642409257"],"references-count":19,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-40925-7_5","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2013]]}}}