{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,15]],"date-time":"2026-02-15T21:02:20Z","timestamp":1771189340513,"version":"3.50.1"},"reference-count":70,"publisher":"Springer Science and Business Media LLC","issue":"23","license":[{"start":{"date-parts":[[2018,5,20]],"date-time":"2018-05-20T00:00:00Z","timestamp":1526774400000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2018,5,20]],"date-time":"2018-05-20T00:00:00Z","timestamp":1526774400000},"content-version":"vor","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Multimed Tools Appl"],"published-print":{"date-parts":[[2018,12]]},"DOI":"10.1007\/s11042-018-6094-2","type":"journal-article","created":{"date-parts":[[2018,5,19]],"date-time":"2018-05-19T22:22:38Z","timestamp":1526768558000},"page":"30167-30185","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":19,"title":["Enhancing touch behavioral authentication via cost-based intelligent mechanism on smartphones"],"prefix":"10.1007","volume":"77","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-4384-5786","authenticated-orcid":false,"given":"Weizhi","family":"Meng","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0003-3745-5669","authenticated-orcid":false,"given":"Wenjuan","family":"Li","sequence":"additional","affiliation":[]},{"given":"Duncan S.","family":"Wong","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2018,5,20]]},"reference":[{"key":"6094_CR1","unstructured":"Aviv AJ, Gibson K, Mossop E, Blaze M, Smith JM (2010) Smudge attacks on smartphone touch screens. In: Proceedings of the 4th USENIX conference on offensive technologies (WOOT). USENIX Association, Berkeley, pp 1\u201310"},{"issue":"4","key":"6094_CR2","doi-asserted-by":"publisher","first-page":"367","DOI":"10.1145\/581271.581272","volume":"5","author":"F Bergadano","year":"2002","unstructured":"Bergadano F, Gunetti D, Picardi C (2002) User authentication through keystroke dynamics. ACM Trans Inf Syst Secur 5(4):367\u2013397","journal-title":"ACM Trans Inf Syst Secur"},{"key":"6094_CR3","doi-asserted-by":"crossref","unstructured":"Cahyani NDW, Martini B, Choo KKR, AKBP Muhammad Nuh Al-Azhar (2017) Forensic Data acquisition from cloud-of-things devices: windows Smartphones as a case study. Concurrency and Computation: Practice and Experience 29(14)","DOI":"10.1002\/cpe.3855"},{"issue":"7","key":"6094_CR4","doi-asserted-by":"publisher","first-page":"519","DOI":"10.1016\/j.cose.2005.08.003","volume":"24","author":"NL Clarke","year":"2005","unstructured":"Clarke NL, Furnell SM (2005) Telephones - a survey of attitudes and practices. Comput Secur 24(7):519\u2013527","journal-title":"Comput Secur"},{"issue":"1","key":"6094_CR5","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/s10207-006-0006-6","volume":"6","author":"NL Clarke","year":"2007","unstructured":"Clarke NL, Furnell SM (2007) Authenticating mobile phone users using keystroke analysis. Int J Inf Secur 6(1):1\u201314","journal-title":"Int J Inf Secur"},{"key":"6094_CR6","unstructured":"Chang L (2015) Smartphone usage soars in US as other devices\u2019 popularity declines. Available at: https:\/\/www.digitaltrends.com\/mobile\/us-smartphone-usage-soars\/"},{"issue":"5","key":"6094_CR7","doi-asserted-by":"publisher","first-page":"945","DOI":"10.1109\/TPAMI.2010.164","volume":"33","author":"J Dai","year":"2011","unstructured":"Dai J, Zhou J (2011) Multifeature-based high-Resolution Palmprint Recognition. IIEEE Trans Pattern Anal Mach Intell 33(5):945\u2013957","journal-title":"IIEEE Trans Pattern Anal Mach Intell"},{"key":"6094_CR8","doi-asserted-by":"publisher","first-page":"94","DOI":"10.1016\/j.cose.2015.06.009","volume":"56","author":"CJ D\u2019Orazio","year":"2016","unstructured":"D\u2019Orazio CJ, Choo KKR (2016) An adversary model to evaluate DRM protection of video contents on iOS devices. Comput Secur 56:94\u2013110","journal-title":"Comput Secur"},{"key":"6094_CR9","doi-asserted-by":"publisher","first-page":"366","DOI":"10.1016\/j.future.2016.08.019","volume":"74","author":"CJ D\u2019Orazio","year":"2017","unstructured":"D\u2019Orazio CJ, Choo KKR (2017) A technique to circumvent SSL\/TLS validations on iOS devices. Futur Gener Comput Syst 74:366\u2013374","journal-title":"Futur Gener Comput Syst"},{"issue":"2","key":"6094_CR10","doi-asserted-by":"publisher","first-page":"524","DOI":"10.1109\/JIOT.2016.2569094","volume":"4","author":"CJ D\u2019Orazio","year":"2017","unstructured":"D\u2019Orazio CJ, Choo KKR, Yang LT (2017) Data exfiltration from internet of things devices: iOS devices as case studies. IEEE Internet of Things Journal 4(2):524\u2013535","journal-title":"IEEE Internet of Things Journal"},{"key":"6094_CR11","doi-asserted-by":"crossref","unstructured":"Dunphy P, Heiner AP, Asokan N (2010) A closer look at recognition-based graphical passwords on mobile devices. In: Proceedings of the 6th symposium on usable privacy and security (SOUPS). ACM, New York, pp 1\u201312","DOI":"10.1145\/1837110.1837114"},{"key":"6094_CR12","doi-asserted-by":"crossref","unstructured":"Feng T, Liu Z, Kwon K-A, Shi W, Carbunary B, Jiang Y, Nguyen N (2012) Continuous mobile authentication using touchscreen gestures. In: Proceedings of the 2012 IEEE conference on technologies for homeland security (HST). IEEE, USA, pp 451\u2013456","DOI":"10.1109\/THS.2012.6459891"},{"issue":"1","key":"6094_CR13","doi-asserted-by":"publisher","first-page":"3","DOI":"10.1007\/s12193-009-0034-4","volume":"4","author":"D Fiorella","year":"2010","unstructured":"Fiorella D, Sanna A, Lamberti F (2010) Multi-touch user interface evaluation for 3D object manipulation on mobile devices. Journal on Multimodal User Interfaces 4(1):3\u201310","journal-title":"Journal on Multimodal User Interfaces"},{"key":"6094_CR14","doi-asserted-by":"crossref","unstructured":"Florencio D, Herley C (2007) A Large-Scale study of web password habits. In: Proceedings of the 16th international conference on world wide Web (WWW). ACM, New York, pp 657\u2013s666","DOI":"10.1145\/1242572.1242661"},{"issue":"1","key":"6094_CR15","doi-asserted-by":"publisher","first-page":"136","DOI":"10.1109\/TIFS.2012.2225048","volume":"8","author":"M Frank","year":"2013","unstructured":"Frank M, Biedert R, Ma E, Martinovic I, Song D (2013) Touchalytics: on the applicability of touchscreen input as a behavioral biometric for continuous authentication. IEEE Trans Inf Forensics Secur 8(1):136\u2013148","journal-title":"IEEE Trans Inf Forensics Secur"},{"key":"6094_CR16","unstructured":"Gaffney JE, Ulvila JW (2001) Evaluation of intrusion detectors: a decision theory approach. In: Proceedings of the 2001 IEEE symposium on security and privacy, pp 50\u201361"},{"key":"6094_CR17","doi-asserted-by":"crossref","unstructured":"Goel M, Wobbrock JO, Patel SN (2012) Gripsense: using built-in sensors to detect hand posture and pressure on commodity mobile phones. In: Proceedings of the 25th Annual ACM symposium on user interface software and technology (UIST). ACM, New York, pp 545\u2013554","DOI":"10.1145\/2380116.2380184"},{"key":"6094_CR18","doi-asserted-by":"crossref","unstructured":"Gong NZ, Moazzezi R, Payer M, Frank M (2016) Forgery-resistant touch-based authentication on mobile devices. In: Proceedings of the 11th ACM Asia conference on computer and communications security pp 499\u2013510","DOI":"10.1145\/2897845.2897908"},{"key":"6094_CR19","doi-asserted-by":"crossref","unstructured":"Gu G, Fogla P, Lee W, Skoric B (2006) Measuring intrusion detection capability: an information-theoretic approach. In: Proceedings of the 2006 ACM symposium on information, computer and communications security (ASIACCS). ACM, New York, pp 90\u2013101","DOI":"10.1145\/1128817.1128834"},{"key":"6094_CR20","unstructured":"IDC (2017) Smartphone OS Market Share. Q1. https:\/\/www.idc.com\/promo\/smartphone-market-share\/os."},{"issue":"1","key":"6094_CR21","doi-asserted-by":"publisher","first-page":"57","DOI":"10.1016\/j.intcom.2010.10.001","volume":"23","author":"N Gunson","year":"2011","unstructured":"Gunson N, Marshall D, McInnes F, Jack M (2011) Usability evaluation of voiceprint authentication in automated telephone banking: sentences versus digits. Interact Comput 23(1):57\u201369","journal-title":"Interact Comput"},{"key":"6094_CR22","doi-asserted-by":"crossref","unstructured":"Karlson AK, Brush AB, Schechter S (2009) Can i borrow your phone?: understanding concerns when sharing mobile phones. In: Proceedings of the 27th international conference on human factors in computing systems (CHI). ACM, New York, pp 1647\u20131650","DOI":"10.1145\/1518701.1518953"},{"issue":"1","key":"6094_CR23","doi-asserted-by":"publisher","first-page":"17","DOI":"10.1016\/j.ijhcs.2006.08.005","volume":"65","author":"M Keith","year":"2007","unstructured":"Keith M, Shao B, Steinbart P (2007) The usability of passphrases for authentication: an empirical field study. Int J Hum Comput Stud 65(1):17\u201328","journal-title":"Int J Hum Comput Stud"},{"key":"6094_CR24","doi-asserted-by":"crossref","unstructured":"Kim D, Dunphy P, Briggs P, Hook J, Nicholson JW, Nicholson J, Olivier P (2010) Multi-touch authentication on tabletops. In: Proceedings of the 28th international conference on human factors in computing systems (CHI). ACM, New York, pp 1093\u20131102","DOI":"10.1145\/1753326.1753489"},{"issue":"3","key":"6094_CR25","doi-asserted-by":"publisher","first-page":"257","DOI":"10.3233\/AIC-2012-0533","volume":"25","author":"L Kotthoff","year":"2012","unstructured":"Kotthoff L, Gent IP, Miguel I (2012) An evaluation of machine learning in algorithm selection for search problems. AI Commun 25(3):257\u2013270","journal-title":"AI Commun"},{"key":"6094_CR26","unstructured":"Lemos R (2002) Passwords: the weakest link? hackers can crack most in less than a minute. http:\/\/news.com\/2009-1001-916719.html"},{"key":"6094_CR27","doi-asserted-by":"publisher","first-page":"18","DOI":"10.1016\/j.knosys.2014.04.010","volume":"79","author":"J Li","year":"2015","unstructured":"Li J, Liu Z, Chen X, Xhafa F, Tan X, Wong DS (2015) L-encDB: a lightweight framework for privacy-preserving data queries in cloud computing. Knowl-Based Syst 79:18\u201326","journal-title":"Knowl-Based Syst"},{"issue":"2","key":"6094_CR28","doi-asserted-by":"publisher","first-page":"425","DOI":"10.1109\/TC.2013.208","volume":"64","author":"J Li","year":"2015","unstructured":"Li J, Li J, Chen X, Jia C, Lou W (2015) Identity-Based Encryption with outsourced revocation in cloud computing. IEEE Trans Comput 64(2):425\u2013437","journal-title":"IEEE Trans Comput"},{"issue":"2","key":"6094_CR29","doi-asserted-by":"publisher","first-page":"439","DOI":"10.1109\/JSYST.2015.2415835","volume":"11","author":"J Li","year":"2017","unstructured":"Li J, Yan H, Liu Z, Chen X, Huang X, Wong DS (2017) Location-Sharing Systems with enhanced privacy in mobile online social networks. IEEE Syst J 11 (2):439\u2013448","journal-title":"IEEE Syst J"},{"key":"6094_CR30","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1016\/j.cose.2017.08.007","volume":"72","author":"J Li","year":"2018","unstructured":"Li J, Zhang Y, Chen X, Xiang Y (2018) Secure attribute-based data sharing for resource-limited users in cloud computing. Comput Secur 72:1\u201312","journal-title":"Comput Secur"},{"issue":"3","key":"6094_CR31","doi-asserted-by":"publisher","first-page":"402","DOI":"10.1109\/34.990140","volume":"24","author":"D Maio","year":"2002","unstructured":"Maio D, Maltoni D, Wayman JL, Jain AK (2002) Fvc2000: Fingerprint verification competition. IEEE Trans Pattern Anal Mach Intell 24(3):402\u2013412","journal-title":"IEEE Trans Pattern Anal Mach Intell"},{"key":"6094_CR32","doi-asserted-by":"crossref","unstructured":"Meng Y, Kwok LF (2011) Adaptive false alarm filter using machine learning in intrusion detection. In: Proceedings of the 6th international conference on intelligent systems and knowledge engineering (ISKE), advances in intelligent and soft computing, Springer, pp 573\u2013584","DOI":"10.1007\/978-3-642-25658-5_68"},{"key":"6094_CR33","doi-asserted-by":"crossref","unstructured":"Meng Y (2012) Measuring intelligent false alarm reduction using an ROC curve-based approach in network intrusion detection. In: Proceedings of the 2012 IEEE international conference on computational intelligence for measurement systems and applications (CIMSA), pp 108\u2013113","DOI":"10.1109\/CIMSA.2012.6269608"},{"key":"6094_CR34","unstructured":"Meng Y, Wong DS, Schlegel R, Kwok LF (2012) Touch gestures based biometric authentication scheme for touchscreen mobile phones. In: Proceedings of the 8th China international conference on information security and cryptology (INSCRYPT). LNCS, Springer, Heidelberg, pp 331\u2013350"},{"key":"6094_CR35","doi-asserted-by":"crossref","unstructured":"Meng Y, Wong DS, Kwok L. -F. (2014) Design of touch dynamics based user authentication with an adaptive mechanism on mobile phones. In: Proceedings of the ACM symposium on applied computing, pp 1680\u20131687","DOI":"10.1145\/2554850.2554931"},{"issue":"3","key":"6094_CR36","doi-asserted-by":"publisher","first-page":"1268","DOI":"10.1109\/COMST.2014.2386915","volume":"17","author":"W Meng","year":"2015","unstructured":"Meng W, Wong DS, Furnell S, Zhou J (2015) Surveying the development of biometric user authentication on mobile phones. IEEE Commun Surv Tutorials 17 (3):1268\u20131293","journal-title":"IEEE Commun Surv Tutorials"},{"issue":"3","key":"6094_CR37","doi-asserted-by":"publisher","first-page":"277","DOI":"10.1108\/ICS-12-2014-0078","volume":"24","author":"W Meng","year":"2016","unstructured":"Meng W (2016) Evaluating the effect of multi-touch behaviours on Android unlock patterns. Inf Comput Secur 24(3):277\u2013287","journal-title":"Inf Comput Secur"},{"key":"6094_CR38","doi-asserted-by":"crossref","unstructured":"Meng W, Li W, Wong DS, Zhou J (2016) TMGUard: a touch movement-based security mechanism for screen unlock patterns on smartphones. In: Proceedings of the 14th international conference on applied cryptography and network security (ACNS), pp 629\u2013647","DOI":"10.1007\/978-3-319-39555-5_34"},{"key":"6094_CR39","doi-asserted-by":"crossref","unstructured":"Meng W, Li W, Jiang L, Meng L (2016) On multiple password interference of touch screen patterns and text passwords. In: Proceedings of ACM conference on human factors in computing systems, pp 4818\u20134822","DOI":"10.1145\/2858036.2858547"},{"key":"6094_CR40","doi-asserted-by":"publisher","first-page":"213","DOI":"10.1016\/j.cose.2016.11.010","volume":"65","author":"W Meng","year":"2017","unstructured":"Meng W, Li W, Kwok L-F, Choo K-KR (2017) Towards enhancing click-draw based graphical passwords using multi-touch behaviours on smartphones. Comput Secur 65:213\u2013229","journal-title":"Comput Secur"},{"key":"6094_CR41","unstructured":"Millennial Media (2012) Mobile mix: the mobile device index. Available at: http:\/\/www.millennialmedia.com\/research"},{"key":"6094_CR42","unstructured":"Mobile and NCSA (2012) Report on consumer behaviors and perceptions of mobile security. Available at: http:\/\/docs.nq.com\/NQ_Mobile_Security_Survey_Jan2012.pdf"},{"key":"6094_CR43","unstructured":"Numabe Y, Nonaka H, Yoshikawa T (2009) Finger identification for touch panel operation using tapping fluctuation. In: Proceedings of the IEEE 13th international symposium on consumer electronics, pp 899\u2013902"},{"key":"6094_CR44","doi-asserted-by":"publisher","first-page":"115","DOI":"10.1016\/j.cose.2017.01.008","volume":"66","author":"TV Nguyen","year":"2017","unstructured":"Nguyen TV, Sae-Bae N, Memon N (2017) DRAW-A-PIN: authentication using finger-drawn PIN on touch devices. Comput Secur 66:115\u2013128","journal-title":"Comput Secur"},{"key":"6094_CR45","doi-asserted-by":"publisher","first-page":"71","DOI":"10.1016\/j.csi.2016.09.002","volume":"49","author":"S Pokharel","year":"2017","unstructured":"Pokharel S, Choo KKR, Liu J (2017) Mobile cloud security: an adversary model for lightweight browser security. Computer Standards & Interfaces 49:71\u201378","journal-title":"Computer Standards & Interfaces"},{"key":"6094_CR46","doi-asserted-by":"crossref","unstructured":"Potharaju R, Newell A, Nita-Rotaru C, Zhang X (2012) Plagiarizing smartphone applications: attack strategies and defense techniques. In: Proceedings of the 2012 international symposium on engineering secure software and systems (ESSoS). LNCS, Springer, Heidelberg, pp 106\u2013120","DOI":"10.1007\/978-3-642-28166-2_11"},{"key":"6094_CR47","doi-asserted-by":"crossref","unstructured":"Pusara M, Brodley CE (2004) User Re-Authentication via mouse movements. In: Proceedings of the 2004 ACM workshop on visualization and data mining for computer security (VizSEC\/DMSEC). ACM, New York, pp 1\u20138","DOI":"10.1145\/1029208.1029210"},{"key":"6094_CR48","doi-asserted-by":"publisher","first-page":"24","DOI":"10.1016\/j.jnca.2016.11.018","volume":"86","author":"D Quick","year":"2017","unstructured":"Quick D, Choo KKR (2017) Pervasive social networking forensics: intelligence and evidence from mobile device extracts. J Netw Comput Appl 86:24\u201333","journal-title":"J Netw Comput Appl"},{"key":"6094_CR49","doi-asserted-by":"crossref","unstructured":"Ranjan J, Whitehouse K (2016) Automatic authentication of smartphone touch interactions using smartwatch. In: Proceedings of the 2016 ACM international joint conference on pervasive and ubiquitous computing, pp 361\u2013364","DOI":"10.1145\/2968219.2971370"},{"key":"6094_CR50","doi-asserted-by":"crossref","unstructured":"Saevanee H, Bhattarakosol P (2009) Authenticating user using keystroke dynamics and finger pressure. In: Proceedings of the 6th IEEE conference on consumer communications and networking conference (CCNC). IEEE Press, USA, pp 1078\u20131079","DOI":"10.1109\/CCNC.2009.4784783"},{"issue":"4","key":"6094_CR51","doi-asserted-by":"publisher","first-page":"568","DOI":"10.1109\/TIFS.2014.2302582","volume":"9","author":"N Sae-Bae","year":"2014","unstructured":"Sae-Bae N, Memon N, Isbister K, Ahmed K (2014) Multitouch gesture-based authentication. IEEE Trans Inf Forensics Secur 9(4):568\u2013582","journal-title":"IEEE Trans Inf Forensics Secur"},{"key":"6094_CR52","doi-asserted-by":"crossref","unstructured":"Smith-Creasey M, Rajarajan M (2016) A continuous user authentication scheme for mobile devices. In: Proceedings of the 14th annual conference on privacy, security and trust (PST), pp 104\u2013113","DOI":"10.1109\/PST.2016.7906944"},{"key":"6094_CR53","doi-asserted-by":"crossref","unstructured":"Sommer R, Paxson V (2010) Outside the closed world: on using machine learning for network intrusion detection. In: Proceedings of the 2010 IEEE Symp on security and privacy, pp 305\u2013316","DOI":"10.1109\/SP.2010.25"},{"key":"6094_CR54","doi-asserted-by":"crossref","unstructured":"Song Y, Cai Z, Zhang Z. -L. (2017) Multi-touch authentication using hand geometry and behavioral information. In: Proceedings of IEEE symposium on security and privacy, pp 357\u2013372","DOI":"10.1109\/SP.2017.54"},{"key":"6094_CR55","doi-asserted-by":"crossref","unstructured":"Schaub F, Deyhle R, Weber M (2012) Password entry usability and shoulder surfing susceptibility on different smartphone platforms. In: Proceedings of the 11th international conference on mobile and ubiquitous multimedia (MUM). ACM, New York, pp 1\u201310","DOI":"10.1145\/2406367.2406384"},{"issue":"2","key":"6094_CR56","doi-asserted-by":"publisher","first-page":"154","DOI":"10.1109\/TIFS.2006.873603","volume":"1","author":"NA Schmid","year":"2006","unstructured":"Schmid NA, Ketkar MV, Singh H, Cukic B (2006) Performance analysis of iris-based identification system at the matching score level. IEEE Trans Inf Forensics Secur 1(2):154\u2013168","journal-title":"IEEE Trans Inf Forensics Secur"},{"issue":"10","key":"6094_CR57","doi-asserted-by":"publisher","first-page":"2726","DOI":"10.1109\/TMC.2016.2635643","volume":"16","author":"M Shahzad","year":"2017","unstructured":"Shahzad M, Liu AX, Samuel A (2017) Behavior based human authentication on touch screen devices using gestures and signatures. IEEE Trans Mob Comput 16 (10):2726\u20132741","journal-title":"IEEE Trans Mob Comput"},{"key":"6094_CR58","doi-asserted-by":"crossref","unstructured":"Sharma V, Enbody R (2017) User authentication and identification from user interface interactions on touch-enabled devices. In: Proceedings of the 10th ACM conference on security and privacy in wireless and mobile networks (WiSec), pp 1\u201311","DOI":"10.1145\/3098243.3098262"},{"issue":"2","key":"6094_CR59","doi-asserted-by":"publisher","first-page":"35","DOI":"10.1109\/MSP.2010.2","volume":"8","author":"A Shabtai","year":"2010","unstructured":"Shabtai A, Fledel Y, Kanonov U, Elovici Y, Dolev S, Glezer C (2010) Google Android: a Comprehensive Security Assessment. IEEE Secur Priv 8(2):35\u201344","journal-title":"IEEE Secur Priv"},{"key":"6094_CR60","doi-asserted-by":"crossref","unstructured":"Tari F, Ozok AA, Holden SH (2006) A comparison of perceived and real shoulder-surfing risks between alphanumeric and graphical passwords. In: Proceedings of the 2nd symposium on usable privacy and security (SOUPS). ACM, New York, pp 56\u201366","DOI":"10.1145\/1143120.1143128"},{"key":"6094_CR61","doi-asserted-by":"crossref","unstructured":"Temper M, Tjoa S, Kaiser M (2015) Touch to authenticate - continuous biometric authentication on mobile devices. In: Proceedings of the 2015 international conference on software security and assurance (ICSSA), pp 30\u201335","DOI":"10.1109\/ICSSA.2015.016"},{"key":"6094_CR62","unstructured":"The PS, Zhang N, Teoh ABJ, Chen K (2015) Recognizing your touch: towards strengthening mobile device authentication via touch dynamics integration. In: Proceedings of the 13th international conference on advances in mobile computing and multimedia (MoMM), pp 108\u2013116"},{"key":"6094_CR63","doi-asserted-by":"crossref","unstructured":"Trewin S, Swart C, Koved L, Martino J, Singh K, Ben-David S (2012) Biometric authentication on a mobile device: a study of user effort, error and task disruption. In: Proceedings of the 28th annual computer security applications conference (ACSAC), pp 159\u2013168","DOI":"10.1145\/2420950.2420976"},{"key":"6094_CR64","doi-asserted-by":"crossref","unstructured":"Van Thanh D (2000) Security issues in mobile eCommerce. In: Proceedings of the 11th international workshop on database and expert systems applications (DEXA). IEEE, USA, pp 412\u2013425","DOI":"10.1109\/DEXA.2000.875060"},{"issue":"2","key":"6094_CR65","doi-asserted-by":"publisher","first-page":"553","DOI":"10.1109\/TIFS.2012.2184095","volume":"7","author":"R Wallace","year":"2012","unstructured":"Wallace R, McLaren M, McCool C, Marcel S (2012) Cross-pollination of normalisation techniques from speaker to face authentication using gaussian mixture models. IEEE Trans Inf Forensics Secur 7(2):553\u2013562","journal-title":"IEEE Trans Inf Forensics Secur"},{"key":"6094_CR66","unstructured":"The University of Waikato. WEKA-Waikato Environment for Knowledge Analysis. Available at: http:\/\/www.cs.waikato.ac.nz\/ml\/weka\/"},{"issue":"5","key":"6094_CR67","doi-asserted-by":"publisher","first-page":"25","DOI":"10.1109\/MSP.2004.81","volume":"2","author":"J Yan","year":"2004","unstructured":"Yan J, Blackwell A, Anderson R, Grant A (2004) Password memorability and security: empirical results. IEEE Secur Priv 2(5):25\u201331","journal-title":"IEEE Secur Priv"},{"key":"6094_CR68","doi-asserted-by":"crossref","unstructured":"Zahid S, Shahzad M, Khayam SA, Farooq M (2009) Keystroke-based user identification on smart phones. In: Proceedings of RAID, lecture notes in computer science, Springer, pp 224\u2013243","DOI":"10.1007\/978-3-642-04342-0_12"},{"issue":"11","key":"6094_CR69","doi-asserted-by":"publisher","first-page":"1780","DOI":"10.1109\/TIFS.2014.2350916","volume":"9","author":"X Zhao","year":"2014","unstructured":"Zhao X, Feng T, Shi W, Kakadiaris IA (2014) Mobile user authentication using statistical touch dynamics images. IEEE Trans Inf Forensics Secur 9(11):1780\u20131789","journal-title":"IEEE Trans Inf Forensics Secur"},{"key":"6094_CR70","doi-asserted-by":"crossref","unstructured":"Zheng N, Bai K, Huang H, Wang H (2014) You are how you touch: user verification on smartphones via tapping behaviors. In: Proceedings of the 2014 international conference on network protocols (ICNP), pp 221\u2013232","DOI":"10.1109\/ICNP.2014.43"}],"container-title":["Multimedia Tools and Applications"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s11042-018-6094-2\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11042-018-6094-2.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11042-018-6094-2.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,2,4]],"date-time":"2021-02-04T11:42:20Z","timestamp":1612438940000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s11042-018-6094-2"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,5,20]]},"references-count":70,"journal-issue":{"issue":"23","published-print":{"date-parts":[[2018,12]]}},"alternative-id":["6094"],"URL":"https:\/\/doi.org\/10.1007\/s11042-018-6094-2","relation":{},"ISSN":["1380-7501","1573-7721"],"issn-type":[{"value":"1380-7501","type":"print"},{"value":"1573-7721","type":"electronic"}],"subject":[],"published":{"date-parts":[[2018,5,20]]},"assertion":[{"value":"21 October 2017","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"5 April 2018","order":2,"name":"revised","label":"Revised","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"2 May 2018","order":3,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"20 May 2018","order":4,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}]}}