{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,3]],"date-time":"2025-12-03T18:13:20Z","timestamp":1764785600940,"version":"3.40.3"},"publisher-location":"Singapore","reference-count":41,"publisher":"Springer Nature Singapore","isbn-type":[{"type":"print","value":"9789819635306"},{"type":"electronic","value":"9789819635313"}],"license":[{"start":{"date-parts":[[2025,1,1]],"date-time":"2025-01-01T00:00:00Z","timestamp":1735689600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2025,1,1]],"date-time":"2025-01-01T00:00:00Z","timestamp":1735689600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2025]]},"DOI":"10.1007\/978-981-96-3531-3_4","type":"book-chapter","created":{"date-parts":[[2025,3,13]],"date-time":"2025-03-13T12:11:41Z","timestamp":1741867901000},"page":"63-81","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["Optimizing Privacy-Preserving Continuous Authentication of\u00a0Mobile Devices"],"prefix":"10.1007","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-4303-0712","authenticated-orcid":false,"given":"David","family":"Monschein","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-5468-2073","authenticated-orcid":false,"given":"Oliver P.","family":"Waldhorst","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2025,3,14]]},"reference":[{"key":"4_CR1","doi-asserted-by":"crossref","unstructured":"Acien, A., Morales, A., Monaco, J.V., Vera-Rodr\u00edguez, R., Fi\u00e9rrez, J.: TypeNet: deep learning keystroke biometrics. IEEE Trans. Biometrics, Behav. Identity Sci.4, 57\u201370 (2021)","DOI":"10.1109\/TBIOM.2021.3112540"},{"key":"4_CR2","doi-asserted-by":"crossref","unstructured":"Acien, A., Morales, A., Vera-Rodr\u00edguez, R., Fi\u00e9rrez, J.: MultiLock: mobile active authentication based on multiple biometric and behavioral patterns. In: Proceedings of the 1st International Workshop on Multimodal Understanding and Learning for Embodied Applications, Nice, France, pp. 53\u201359 (2019)","DOI":"10.1145\/3347450.3357663"},{"key":"4_CR3","doi-asserted-by":"crossref","unstructured":"Aharoni, E., et al.: HeLayers: a tile tensors framework for large neural networks on encrypted data. In: Proceedings of the 23rd Privacy Enhancing Technology Symposium, Lausanne, Switzerland, pp. 325\u2013342 (2023)","DOI":"10.56553\/popets-2023-0020"},{"issue":"1","key":"4_CR4","doi-asserted-by":"publisher","first-page":"53","DOI":"10.1186\/s40537-021-00444-8","volume":"8","author":"L Alzubaidi","year":"2021","unstructured":"Alzubaidi, L., et al.: Review of deep learning: concepts, CNN architectures, challenges, applications, future directions. Big Data 8(1), 53 (2021)","journal-title":"Big Data"},{"key":"4_CR5","doi-asserted-by":"publisher","first-page":"1833","DOI":"10.1007\/s10207-023-00721-y","volume":"22","author":"AF Baig","year":"2023","unstructured":"Baig, A.F., Eskeland, S., Yang, B.: Privacy-preserving continuous authentication using behavioral biometrics. Springer Inf. Secur. 22, 1833\u20131847 (2023)","journal-title":"Springer Inf. Secur."},{"issue":"1","key":"4_CR6","doi-asserted-by":"publisher","first-page":"3","DOI":"10.3390\/cryptography8010003","volume":"8","author":"AF Baig","year":"2024","unstructured":"Baig, A.F., Eskeland, S., Yang, B.: Novel and efficient privacy-preserving continuous authentication. MDPI Cryptogr. 8(1), 3 (2024)","journal-title":"MDPI Cryptogr."},{"key":"4_CR7","doi-asserted-by":"crossref","unstructured":"Baumstark, P., Monschein, D., Waldhorst, O.P.: Secure plaintext acquisition of homomorphically encrypted results for remote processing. In: Proceedings of the 48th IEEE Conference on Local Computer Networks, Daytona Beach, FL, USA (2023)","DOI":"10.1109\/LCN58197.2023.10223372"},{"key":"4_CR8","volume-title":"Client\/Server Architecture","author":"A Berson","year":"1992","unstructured":"Berson, A.: Client\/Server Architecture. McGraw-Hill, New York (1992)"},{"key":"4_CR9","doi-asserted-by":"crossref","unstructured":"Chen, T., Guestrin, C.: XGBoost: a scalable tree boosting system. In: Proceedings of the 22nd ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, San Francisco, CA, USA, pp. 785\u2013794 (2016)","DOI":"10.1145\/2939672.2939785"},{"key":"4_CR10","doi-asserted-by":"crossref","unstructured":"Cheon, J.H., Kim, A., Kim, M., Song, Y.: Homomorphic encryption for arithmetic of approximate numbers. In: Proceedings of the 23rd International Conference on Theory and Application of Cryptology and Information Security, Hong Kong, China, pp. 409\u2013437 (2017)","DOI":"10.1007\/978-3-319-70694-8_15"},{"key":"4_CR11","unstructured":"Chollet, F., et\u00a0al.: Keras (2015). https:\/\/keras.io"},{"issue":"1","key":"4_CR12","doi-asserted-by":"publisher","first-page":"22","DOI":"10.1504\/IJACT.2008.017048","volume":"1","author":"I Damgard","year":"2008","unstructured":"Damgard, I., Geisler, M., Kroigard, M.: Homomorphic encryption and secure comparison. Appl. Cryptogr. 1(1), 22\u201331 (2008)","journal-title":"Appl. Cryptogr."},{"key":"4_CR13","doi-asserted-by":"crossref","unstructured":"Dathathri, R., Kostova, B., Saarikivi, O., Dai, W., Laine, K., Musuvathi, M.: EVA: an encrypted vector arithmetic language and compiler for efficient homomorphic computation. In: Proceedings of the 41st ACM SIGPLAN Conference on Programming Language Design and Implementation, London, UK, pp. 546\u2013561 (2020)","DOI":"10.1145\/3385412.3386023"},{"key":"4_CR14","doi-asserted-by":"crossref","unstructured":"Domingo-Ferrer, J., Wu, Q., Blanco-Justicia, A.: Flexible and robust privacy-preserving implicit authentication. In: Proceedings of the 30th IFIP TC 11 International Conference on ICT Systems Security and Privacy Protection, Hamburg, Germany, pp. 18\u201334 (2015)","DOI":"10.1007\/978-3-319-18467-8_2"},{"key":"4_CR15","doi-asserted-by":"crossref","unstructured":"Govindarajan, S., Gasti, P., Balagani, K.S.: Secure privacy-preserving protocols for outsourcing continuous authentication of smartphone users with touch data. In: Proceedings of the 6th IEEE International Conference on Biometrics: Theory, Applications and Systems, Washington, DC, USA, pp.\u00a01\u20138 (2013)","DOI":"10.1109\/BTAS.2013.6712742"},{"key":"4_CR16","doi-asserted-by":"publisher","first-page":"189","DOI":"10.1016\/j.patrec.2021.04.013","volume":"147","author":"L Hern\u00e1ndez-\u00c1lvarez","year":"2021","unstructured":"Hern\u00e1ndez-\u00c1lvarez, L., de Fuentes, J.M., Gonz\u00e1lez-Manzano, L., Hern\u00e1ndez Encinas, L.: SmartCAMPP - smartphone-based continuous authentication leveraging motion sensors with privacy preservation. Elsevier Pattern Recognit. Lett. 147, 189\u2013196 (2021)","journal-title":"Elsevier Pattern Recognit. Lett."},{"issue":"1","key":"4_CR17","doi-asserted-by":"publisher","first-page":"92","DOI":"10.3390\/s21010092","volume":"21","author":"L Hern\u00e1ndez-\u00c1lvarez","year":"2021","unstructured":"Hern\u00e1ndez-\u00c1lvarez, L., de Fuentes, J.M., Gonz\u00e1lez-Manzano, L., Hern\u00e1ndez Encinas, L.: Privacy-preserving sensor-based continuous authentication and user profiling: a review. MDPI Sens. 21(1), 92 (2021)","journal-title":"MDPI Sens."},{"issue":"8","key":"4_CR18","doi-asserted-by":"publisher","first-page":"1735","DOI":"10.1162\/neco.1997.9.8.1735","volume":"9","author":"S Hochreiter","year":"1997","unstructured":"Hochreiter, S., Schmidhuber, J.: Long short-term memory. Neural Comput. 9(8), 1735\u20131780 (1997)","journal-title":"Neural Comput."},{"key":"4_CR19","doi-asserted-by":"crossref","unstructured":"Karanikiotis, T., Papamichail, M.D., Chatzidimitriou, K.C., Oikonomou, N.C.I., Symeonidis, A.L., Saripalle, S.K.: Continuous implicit authentication through touch traces modelling. In: Proceedings of the 20th IEEE International Conference on Software Quality, Reliability and Security, Macau, China, pp. 111\u2013120 (2020)","DOI":"10.1109\/QRS51102.2020.00026"},{"key":"4_CR20","unstructured":"Lacharme, P., Cherrier, E., Rosenberger, C.: Preimage attack on biohashing. In: Proceedings of the International Conference on Security and Cryptography, Reykjav\u00edk, Iceland, pp.\u00a01\u20138 (2013)"},{"key":"4_CR21","doi-asserted-by":"crossref","unstructured":"Li, P., Pei, Y., Li, J.: A comprehensive survey on design and application of autoencoder in deep learning. Appl. Soft Comput. 138 (2023)","DOI":"10.1016\/j.asoc.2023.110176"},{"key":"4_CR22","doi-asserted-by":"crossref","unstructured":"Loya, J., Bana, T.: Privacy-preserving keystroke analysis using fully homomorphic encryption & differential privacy. In: Proceedings of the IEEE International Conference on Cyberworlds, pp. 291\u2013294 (2021)","DOI":"10.1109\/CW52790.2021.00055"},{"key":"4_CR23","doi-asserted-by":"crossref","unstructured":"Monschein, D., Waldhorst, O.P.: SPCAuth: scalable and privacy-preserving continuous authentication for web applications. In: Proceedings of the 46th IEEE Conference on Local Computer Networks (LCN), pp. 281\u2013286. Virtual Conf. (2021)","DOI":"10.1109\/LCN52139.2021.9524959"},{"key":"4_CR24","unstructured":"Monschein, D., Waldhorst, O.P.: mPSAuth: privacy-preserving and scalable authentication for mobile web applications (2022). https:\/\/arxiv.org\/abs\/2210.04777"},{"key":"4_CR25","doi-asserted-by":"crossref","unstructured":"Paillier, P.: Public-key cryptosystems based on composite degree residuosity classes. In: Proceedings of the 17th IACR Eurocrypt Conference, Prague, Czech Republic, pp. 223\u2013238 (1999)","DOI":"10.1007\/3-540-48910-X_16"},{"key":"4_CR26","doi-asserted-by":"crossref","unstructured":"Pele, O., Werman, M.: Fast and robust earth mover\u2019s distances. In: Proceedings of the 12th IEEE International Conference on Computer Vision, Kyoto, Japan, pp. 460\u2013467 (2009)","DOI":"10.1109\/ICCV.2009.5459199"},{"key":"4_CR27","doi-asserted-by":"publisher","first-page":"117477","DOI":"10.1109\/ACCESS.2022.3219049","volume":"10","author":"R Podschwadt","year":"2022","unstructured":"Podschwadt, R., Takabi, D., Hu, P., Rafiei, M.H., Cai, Z.: A survey of deep learning architectures for privacy-preserving machine learning with fully homomorphic encryption. IEEE Access 10, 117477\u2013117500 (2022)","journal-title":"IEEE Access"},{"issue":"3","key":"4_CR28","doi-asserted-by":"publisher","first-page":"871","DOI":"10.1109\/TBME.2008.2006190","volume":"56","author":"SJ Preece","year":"2009","unstructured":"Preece, S.J., Goulermas, J.Y., Kenney, L.P.J., Howard, D.: A comparison of feature extraction methods for the classification of dynamic activities from accelerometer data. IEEE Trans. Biomed. Eng. 56(3), 871\u2013879 (2009)","journal-title":"IEEE Trans. Biomed. Eng."},{"key":"4_CR29","doi-asserted-by":"crossref","unstructured":"Pulido-Gaytan, L.B., Tchernykh, A., Cort\u00e9s-Mendoza, J.M., Babenko, M., Radchenko, G.: A survey on privacy-preserving machine learning with fully homomorphic encryption. In: Proceedings of the Latin America High Performance Computing Conference, Guadalajara, Mexico, pp. 115\u2013129 (2021)","DOI":"10.1007\/978-3-030-68035-0_9"},{"key":"4_CR30","unstructured":"Microsoft SEAL (release 4.1), January 2023. https:\/\/github.com\/Microsoft\/SEAL"},{"key":"4_CR31","unstructured":"Smilkov, D., et al.: Tensorflow.js: machine learning for the web and beyond. In: Proceedings of the Machine Learning and Systems, Stanford, CA, USA, pp. 309\u2013321 (2019)"},{"key":"4_CR32","doi-asserted-by":"crossref","unstructured":"Stragapede, G., Vera-Rodriguez, R., Tolosana, R., Morales, A.: BehavePassDB: public database for mobile behavioral biometrics and benchmark evaluation. Pattern Recognit. 134(C) (2023)","DOI":"10.1016\/j.patcog.2022.109089"},{"key":"4_CR33","doi-asserted-by":"publisher","first-page":"76","DOI":"10.1016\/j.inffus.2020.08.021","volume":"66","author":"I Stylios","year":"2021","unstructured":"Stylios, I., Kokolakis, S., Thanou, O., Chatzis, S.: Behavioral biometrics & continuous user authentication on mobile devices: a survey. Inf. Fusion 66, 76\u201399 (2021)","journal-title":"Inf. Fusion"},{"key":"4_CR34","doi-asserted-by":"crossref","unstructured":"Topcu, B., Karabat, C., Azadmanesh, M., Erdogan, H.: Practical security and privacy attacks against biometric hashing using sparse recovery. EURASIP Adv. Signal Process. (2016)","DOI":"10.1186\/s13634-016-0396-1"},{"key":"4_CR35","doi-asserted-by":"crossref","unstructured":"Vassallo, G., Van\u00a0hamme, T., Preuveneers, D., Joosen, W.: Privacy-preserving behavioral authentication on smartphones. In: Proceedings of the 1st Inter4national Workshop on Human-Centered Sensing, Networking, and Systems, Delft, Netherlands, pp.\u00a01\u20136 (2017)","DOI":"10.1145\/3144730.3144731"},{"key":"4_CR36","doi-asserted-by":"crossref","unstructured":"Wang, C., Wang, Y., Chen, Y., Liu, H., Liu, J.: User authentication on mobile devices: approaches, threats and trends. Comput. Netw. 170 (2020)","DOI":"10.1016\/j.comnet.2020.107118"},{"issue":"7","key":"4_CR37","doi-asserted-by":"publisher","first-page":"5599","DOI":"10.1109\/JIOT.2020.3031486","volume":"8","author":"F Wei","year":"2021","unstructured":"Wei, F., Vijayakumar, P., Kumar, N., Zhang, R., Cheng, Q.: Privacy-preserving implicit authentication protocol using cosine similarity for internet of things. IEEE Internet Things J. 8(7), 5599\u20135606 (2021)","journal-title":"IEEE Internet Things J."},{"issue":"2","key":"4_CR38","doi-asserted-by":"publisher","first-page":"1744","DOI":"10.1109\/TDSC.2022.3162623","volume":"20","author":"Y Wu","year":"2023","unstructured":"Wu, Y., et al.: Attacks and countermeasures on privacy-preserving biometric authentication schemes. IEEE Trans. Depend. Secure Comput. 20(2), 1744\u20131755 (2023)","journal-title":"IEEE Trans. Depend. Secure Comput."},{"issue":"7","key":"4_CR39","doi-asserted-by":"publisher","first-page":"3566","DOI":"10.3390\/s23073566","volume":"23","author":"W Yang","year":"2023","unstructured":"Yang, W., Wang, S., Cui, H., Tang, Z., Li, Y.: A review of homomorphic encryption for privacy-preserving biometrics. MDPI Sensors 23(7), 3566 (2023)","journal-title":"MDPI Sensors"},{"key":"4_CR40","doi-asserted-by":"publisher","unstructured":"Yi, X., Paulet, R., Bertino, E.: Homomorphic encryption. In: Homomorphic Encryption and Applications, pp. 27\u201346. Springer, Cham (2014). https:\/\/doi.org\/10.1007\/978-3-319-12229-8_2","DOI":"10.1007\/978-3-319-12229-8_2"},{"key":"4_CR41","doi-asserted-by":"publisher","first-page":"73","DOI":"10.1016\/j.procs.2019.06.012","volume":"154","author":"EM Zhao","year":"2019","unstructured":"Zhao, E.M., Geng, Y.: Homomorphic encryption technology for cloud computing. Procedia Comput. Sci. 154, 73\u201383 (2019)","journal-title":"Procedia Comput. Sci."}],"container-title":["Lecture Notes in Computer Science","Network and System Security"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-981-96-3531-3_4","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,3,13]],"date-time":"2025-03-13T12:11:57Z","timestamp":1741867917000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-981-96-3531-3_4"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025]]},"ISBN":["9789819635306","9789819635313"],"references-count":41,"URL":"https:\/\/doi.org\/10.1007\/978-981-96-3531-3_4","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2025]]},"assertion":[{"value":"14 March 2025","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"The authors have no competing interests to declare that are relevant to the content of this article.","order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Disclosure of Interests"}},{"value":"NSS","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Network and System Security","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Abu Dhabi","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"United Arab Emirates","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2024","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"21 November 2024","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"23 November 2024","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"18","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"nss2024","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/nsclab.org\/nss-socialsec2024\/index.html","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}