{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,11]],"date-time":"2026-03-11T09:33:24Z","timestamp":1773221604345,"version":"3.50.1"},"reference-count":49,"publisher":"Informa UK Limited","issue":"3","funder":[{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["71671020"],"award-info":[{"award-number":["71671020"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["52005062"],"award-info":[{"award-number":["52005062"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"name":"Technology Innovation and Application Development Key Project of Chongqing, China","award":["cstc2019jscx-mbdxX0049"],"award-info":[{"award-number":["cstc2019jscx-mbdxX0049"]}]}],"content-domain":{"domain":["www.tandfonline.com"],"crossmark-restriction":true},"short-container-title":["Behaviour &amp; Information Technology"],"published-print":{"date-parts":[[2025,2,7]]},"DOI":"10.1080\/0144929x.2024.2321933","type":"journal-article","created":{"date-parts":[[2024,3,8]],"date-time":"2024-03-08T13:40:44Z","timestamp":1709905244000},"page":"428-445","update-policy":"https:\/\/doi.org\/10.1080\/tandf_crossmark_01","source":"Crossref","is-referenced-by-count":9,"title":["Trustworthy interaction model: continuous authentication using time\u2013frequency joint analysis of mouse biometrics"],"prefix":"10.1080","volume":"44","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-6412-6599","authenticated-orcid":false,"given":"YiGong","family":"Zhang","sequence":"first","affiliation":[{"name":"Chongqing University","place":["Chongqing, People\u2019s Republic of China"]},{"name":"Chongqing University","place":["Chongqing, People\u2019s Republic of China"]}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-5130-9249","authenticated-orcid":false,"given":"Qian","family":"Yi","sequence":"additional","affiliation":[{"name":"Chongqing University","place":["Chongqing, People\u2019s Republic of China"]}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-6054-9896","authenticated-orcid":false,"given":"ShuPing","family":"Yi","sequence":"additional","affiliation":[{"name":"Chongqing University","place":["Chongqing, People\u2019s Republic of China"]}]},{"given":"XiaoLong","family":"Zhang","sequence":"additional","affiliation":[{"name":"Pennsylvania State University","place":["University Park, USA"]}]},{"given":"JiaJia","family":"Li","sequence":"additional","affiliation":[{"name":"Chongqing University","place":["Chongqing, People\u2019s Republic of China"]}]}],"member":"301","published-online":{"date-parts":[[2024,3,8]]},"reference":[{"key":"e_1_3_3_2_1","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2007.70207"},{"key":"e_1_3_3_3_1","doi-asserted-by":"publisher","DOI":"10.3390\/app11136083"},{"key":"e_1_3_3_4_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.knosys.2016.11.006"},{"key":"e_1_3_3_5_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2019.06.057"},{"key":"e_1_3_3_6_1","doi-asserted-by":"publisher","DOI":"10.1049\/iet-bmt.2018.5126"},{"key":"e_1_3_3_7_1","doi-asserted-by":"publisher","DOI":"10.1142\/S1793536910000367"},{"key":"e_1_3_3_8_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.newideapsych.2010.08.001"},{"key":"e_1_3_3_9_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.istr.2012.02.001"},{"key":"e_1_3_3_10_1","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2019.2930429"},{"key":"e_1_3_3_11_1","doi-asserted-by":"publisher","DOI":"10.1016\/S0893-6080(98)00083-5"},{"key":"e_1_3_3_12_1","doi-asserted-by":"publisher","DOI":"10.1109\/TPAMI.2003.1227991"},{"key":"e_1_3_3_13_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.ins.2012.02.066"},{"key":"e_1_3_3_14_1","doi-asserted-by":"publisher","DOI":"10.1109\/JSYST.2015.2472579"},{"key":"e_1_3_3_15_1","doi-asserted-by":"publisher","DOI":"10.1214\/aos\/1013203451"},{"key":"e_1_3_3_16_1","unstructured":"Fulop A. L. Kovacs T. Kurics and E. Windhager-Pokol. 2016. \u201cBalabit Mouse Dynamics Challenge Data Set.\u201d Accessed January 26 2019. http:\/\/github.com\/balabit\/Mouse-Dynamics-Challenge."},{"key":"e_1_3_3_17_1","doi-asserted-by":"publisher","DOI":"10.1117\/12.542625"},{"key":"e_1_3_3_18_1","doi-asserted-by":"publisher","DOI":"10.1007\/s00422-010-0416-4"},{"key":"e_1_3_3_19_1","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1155\/2021\/6669429","article-title":"Design and Implementation of Continuous Authentication Mechanism Based on Multimodal Fusion Mechanism","volume":"2021","author":"Guan J.","year":"2021","unstructured":"Guan, J., X. Li, and Y. Zhang. 2021. \u201cDesign and Implementation of Continuous Authentication Mechanism Based on Multimodal Fusion Mechanism.\u201d Security and Communication Networks 2021: 1\u201319.","journal-title":"Security and Communication Networks"},{"issue":"99","key":"e_1_3_3_20_1","first-page":"1","article-title":"Privbiomtauth: Privacy Preserving Biometrics-Based and User Centric Protocol for User Authentication from Mobile Phones","author":"Gunasinghe H.","year":"2017","unstructured":"Gunasinghe, H., and E. Bertino. 2017. \u201cPrivbiomtauth: Privacy Preserving Biometrics-Based and User Centric Protocol for User Authentication from Mobile Phones.\u201d IEEE Transactions on Information Forensics & Security PP (99): 1\u20131.","journal-title":"IEEE Transactions on Information Forensics & Security"},{"key":"e_1_3_3_21_1","doi-asserted-by":"publisher","DOI":"10.1007\/11538059_91"},{"key":"e_1_3_3_22_1","doi-asserted-by":"publisher","DOI":"10.1155\/2019\/3898951"},{"key":"e_1_3_3_23_1","doi-asserted-by":"publisher","DOI":"10.1098\/rspa.1998.0193"},{"key":"e_1_3_3_24_1","doi-asserted-by":"publisher","DOI":"10.48550\/arXiv.2005.07034"},{"key":"e_1_3_3_25_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.neunet.2014.05.004"},{"key":"e_1_3_3_26_1","unstructured":"Kemp S. 2023. \u201cDigital 2023: Global Statshot \u2014 DataReportal \u2013 Global Digital Insights.\u201d Accessed August 31 2020. https:\/\/datareportal.com\/reports\/digital-2023-global-overview-report."},{"key":"e_1_3_3_27_1","doi-asserted-by":"publisher","DOI":"10.1007\/PL00005770"},{"key":"e_1_3_3_28_1","doi-asserted-by":"publisher","DOI":"10.1109\/TBIOM.2020.2997004"},{"key":"e_1_3_3_29_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-981-13-2384-3_11"},{"key":"e_1_3_3_30_1","doi-asserted-by":"publisher","DOI":"10.1002\/jor.1100070219"},{"key":"e_1_3_3_31_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.ins.2014.12.045"},{"key":"e_1_3_3_32_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.neucom.2016.11.031"},{"key":"e_1_3_3_33_1","doi-asserted-by":"publisher","DOI":"10.1109\/TSMCA.2010.2052602"},{"key":"e_1_3_3_34_1","doi-asserted-by":"publisher","DOI":"10.1007\/s00221-002-1060-6"},{"key":"e_1_3_3_35_1","doi-asserted-by":"publisher","DOI":"10.1109\/THMS.2016.2623562"},{"key":"e_1_3_3_36_1","doi-asserted-by":"publisher","DOI":"10.1145\/1029208.1029210"},{"key":"e_1_3_3_37_1","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2023.3245418"},{"key":"e_1_3_3_38_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-94-007-4792-0_62"},{"key":"e_1_3_3_39_1","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2012.2223677"},{"key":"e_1_3_3_40_1","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2017.2771295"},{"key":"e_1_3_3_41_1","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2011.2169958"},{"key":"e_1_3_3_42_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-50309-3_45"},{"key":"e_1_3_3_43_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-22351-9_14"},{"key":"e_1_3_3_44_1","doi-asserted-by":"publisher","DOI":"10.13195\/j.kzyjc.2018.1618"},{"key":"e_1_3_3_45_1","doi-asserted-by":"publisher","DOI":"10.13190\/j.jbupt.2020-244"},{"key":"e_1_3_3_46_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.ergon.2019.102903"},{"key":"e_1_3_3_47_1","doi-asserted-by":"publisher","DOI":"10.1080\/0144929X.2020.1851767"},{"key":"e_1_3_3_48_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10207-021-00544-9"},{"key":"e_1_3_3_49_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-52581-1_9"},{"key":"e_1_3_3_50_1","doi-asserted-by":"publisher","DOI":"10.1145\/2893185"}],"container-title":["Behaviour &amp; Information Technology"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.tandfonline.com\/doi\/pdf\/10.1080\/0144929X.2024.2321933","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,2,13]],"date-time":"2025-02-13T13:58:08Z","timestamp":1739455088000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.tandfonline.com\/doi\/full\/10.1080\/0144929X.2024.2321933"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,3,8]]},"references-count":49,"journal-issue":{"issue":"3","published-print":{"date-parts":[[2025,2,7]]}},"alternative-id":["10.1080\/0144929X.2024.2321933"],"URL":"https:\/\/doi.org\/10.1080\/0144929x.2024.2321933","relation":{},"ISSN":["0144-929X","1362-3001"],"issn-type":[{"value":"0144-929X","type":"print"},{"value":"1362-3001","type":"electronic"}],"subject":[],"published":{"date-parts":[[2024,3,8]]},"assertion":[{"value":"The publishing and review policy for this title is described in its Aims & Scope.","order":1,"name":"peerreview_statement","label":"Peer Review Statement"},{"value":"http:\/\/www.tandfonline.com\/action\/journalInformation?show=aimsScope&journalCode=tbit20","URL":"http:\/\/www.tandfonline.com\/action\/journalInformation?show=aimsScope&journalCode=tbit20","order":2,"name":"aims_and_scope_url","label":"Aim & Scope"},{"value":"2023-03-14","order":0,"name":"received","label":"Received","group":{"name":"publication_history","label":"Publication History"}},{"value":"2024-02-17","order":2,"name":"accepted","label":"Accepted","group":{"name":"publication_history","label":"Publication History"}},{"value":"2024-03-08","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}