{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,28]],"date-time":"2026-01-28T05:13:10Z","timestamp":1769577190413,"version":"3.49.0"},"reference-count":21,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2013,9]]},"DOI":"10.1109\/btas.2013.6712758","type":"proceedings-article","created":{"date-parts":[[2014,1,24]],"date-time":"2014-01-24T19:14:03Z","timestamp":1390590843000},"page":"1-8","source":"Crossref","is-referenced-by-count":95,"title":["Which verifiers work?: A benchmark evaluation of touch-based authentication algorithms"],"prefix":"10.1109","author":[{"given":"Abdul","family":"Serwadda","sequence":"first","affiliation":[]},{"given":"Vir V.","family":"Phoha","sequence":"additional","affiliation":[]},{"given":"Zibo","family":"Wang","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"19","doi-asserted-by":"publisher","DOI":"10.1109\/BTAS.2012.6374551"},{"key":"17","doi-asserted-by":"publisher","DOI":"10.1145\/2207676.2208543"},{"key":"18","doi-asserted-by":"publisher","DOI":"10.1109\/BTAS.2012.6374571"},{"key":"15","doi-asserted-by":"publisher","DOI":"10.1145\/2162081.2162095"},{"key":"16","first-page":"15","article-title":"Progressive authentication: Deciding when to authenticate on mobile phones","author":"riva","year":"2012","journal-title":"Proceedings of the 21stUSENIX Conference on Security Symposium Security'12"},{"key":"13","article-title":"Unobservable reauthentication for smart phones","author":"li","year":"2013","journal-title":"Proceedings of the 20th Network and Distributed System Security Symposium NDSS'13"},{"key":"14","doi-asserted-by":"publisher","DOI":"10.1080\/01621459.1951.10500769"},{"key":"11","first-page":"9","article-title":"Implicit authentication for mobile devices","author":"jakobsson","year":"2009","journal-title":"Proceedings of the 4thUSENIX Conference on Hot Topics in Security HotSec'09"},{"key":"12","doi-asserted-by":"publisher","DOI":"10.1109\/DSN.2009.5270346"},{"key":"3","article-title":"Multitask learning for hostpathogen protein interactions","volume":"29","year":"2013","journal-title":"Bioinformatics"},{"key":"21","author":"witten","year":"2005","journal-title":"Data Mining Practical Machine Learning Tools and Techniques"},{"key":"2","year":"0","journal-title":"Gartner Says Worldwide Pc Tablet and Mobile Phone Combined Shipments to Reach 2 4 Billion Units in 2013"},{"key":"20","article-title":"Continuous mobile authentication using touchscreen gestures","author":"tao","year":"2012","journal-title":"Proceedings of the 12thIEEE Conference on Technologies for Homeland Security HST'12"},{"key":"1","year":"0","journal-title":"Darpa-baa-13-16 Active Authentication (AA) Phase 2"},{"key":"10","first-page":"136","author":"frank","year":"2013","journal-title":"Touchalytics On the Applicability of Touchscreen Input as a Behavioral Biometric for Continuous Authentication"},{"key":"7","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.1967.1053964"},{"key":"6","doi-asserted-by":"publisher","DOI":"10.1007\/BF00994018"},{"key":"5","doi-asserted-by":"publisher","DOI":"10.1023\/A:1010933404324"},{"key":"4","first-page":"1","article-title":"Smudge attacks on smartphone touch screens","author":"aviv","year":"2010","journal-title":"Proceedings of the 4thUSENIX Conference on Offensive Technologies WOOT'10"},{"key":"9","author":"duda","year":"2002","journal-title":"Pattern Classification"},{"key":"8","doi-asserted-by":"publisher","DOI":"10.1145\/2207676.2208544"}],"event":{"name":"2013 IEEE 6th International Conference on Biometrics: Theory, Applications and Systems (BTAS)","location":"Arlington, VA, USA","start":{"date-parts":[[2013,9,29]]},"end":{"date-parts":[[2013,10,2]]}},"container-title":["2013 IEEE Sixth International Conference on Biometrics: Theory, Applications and Systems (BTAS)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6704951\/6712682\/06712758.pdf?arnumber=6712758","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,3,22]],"date-time":"2017-03-22T22:30:52Z","timestamp":1490221852000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/6712758\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2013,9]]},"references-count":21,"URL":"https:\/\/doi.org\/10.1109\/btas.2013.6712758","relation":{},"subject":[],"published":{"date-parts":[[2013,9]]}}}