{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,5,20]],"date-time":"2025-05-20T21:40:10Z","timestamp":1747777210423,"version":"3.41.0"},"reference-count":33,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2014,8]]},"DOI":"10.1109\/chinacom.2014.7054316","type":"proceedings-article","created":{"date-parts":[[2015,3,10]],"date-time":"2015-03-10T21:47:26Z","timestamp":1426024046000},"page":"353-356","source":"Crossref","is-referenced-by-count":5,"title":["Work in progress: A new approach of changeable password for keystroke dynamics authentication system on smart phones"],"prefix":"10.1109","author":[{"given":"Cheng-Jung","family":"Tsai","sequence":"first","affiliation":[]},{"given":"Chun-Cheng","family":"Peng","sequence":"additional","affiliation":[]},{"given":"Mao-Lun","family":"Chiang","sequence":"additional","affiliation":[]},{"given":"Ting-Yi","family":"Chang","sequence":"additional","affiliation":[]},{"given":"Wang-Jui","family":"Tsai","sequence":"additional","affiliation":[]},{"given":"Han-Sing","family":"Wu","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref33","first-page":"428","volume":"23","author":"yu","year":"2004","journal-title":"Keystroke dynamics identity verification-its problems and practical solutions Computers & Security"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-25364-5_34"},{"key":"ref31","first-page":"7875","volume":"8","author":"tsai","year":"2012","journal-title":"An Approach for User Authentication on Non-Keyboard Devices using Mouse Click Characteristics and Statistical-Based Classification International Journal of Innovative Computing Information and Control special issue on Decision Making on Information Security Strategy & Technology"},{"key":"ref30","first-page":"750","article-title":"Two novel biometric features in keystroke dynamics authentication systems for touch screen devices","volume":"7","author":"tsai","year":"2013","journal-title":"Security and Communication Networks"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1007\/s10207-006-0006-6"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1016\/j.patrec.2005.10.010"},{"key":"ref12","first-page":"427","volume":"30","author":"giot","year":"2011","journal-title":"Unconstrained keystroke dynamics authentication with shared secret Computers & Security"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/ICPR.2006.506"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/ICASSP.2006.1660861"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/ICC.2008.301"},{"key":"ref16","first-page":"85","volume":"28","author":"hwang","year":"2009","journal-title":"Keystroke dynamics-based authentication for mobile devices Computers & Security"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/TCSVT.2003.818349"},{"key":"ref18","doi-asserted-by":"crossref","first-page":"584","DOI":"10.1007\/978-3-540-74549-5_62","article-title":"Keystroke dynamics in a general setting","author":"janakiraman","year":"2007","journal-title":"Proceedings of International Conference on Advances in Biometrics"},{"key":"ref19","first-page":"359","article-title":"Keystroke statistical learning model for web authentication","author":"jiang","year":"2007","journal-title":"Proceedings of ACM conference on Computer and Communications security"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1109\/ICCEE.2008.157"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1016\/j.jss.2011.12.044"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1109\/ISPACS.2006.364872"},{"key":"ref3","first-page":"333","volume":"3","author":"campisi","year":"2009","journal-title":"User authentication using keystroke dynamics for cellular phones IET Signal Processing"},{"key":"ref6","first-page":"1345","volume":"74","author":"chiang","year":"2014","journal-title":"Real-time data delivery using prediction mechanism in mobile environments Wireless Personal Communications"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1109\/CyberSec.2012.6246096"},{"key":"ref5","doi-asserted-by":"crossref","DOI":"10.1002\/dac.2515","article-title":"Congestion control with dynamic threshold adaptation and cross-layer response for tcp vegas over ieee 802.11 wireless networks","author":"cheng","year":"2014","journal-title":"International Journal of Communication System"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-71629-7_48"},{"key":"ref7","first-page":"193","volume":"76","author":"chin","year":"2014","journal-title":"E-BEB enhanced binary exponential backoff algorithm for multi-hop wireless ad-hoc networks Wireless Personal Communications"},{"key":"ref2","first-page":"254","author":"boechat","year":"2007","journal-title":"Authentication personal Proceedings of IEEE International Conference on Intelligent and Advanced Systems"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1108\/09685220310489526"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/TSP.2004.839903"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1145\/75577.75582"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1155\/2014\/754749"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/JSYST.2013.2256320"},{"key":"ref24","first-page":"439","volume":"13","author":"liu","year":"2012","journal-title":"A simple keystroke dynamics-based authentication system using means and standard deviations Journal of Internet Technology"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1155\/2014\/937842"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1109\/21.293498"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2006.11.006"}],"event":{"name":"2014 9th International Conference on Communications and Networking in China (CHINACOM)","start":{"date-parts":[[2014,8,14]]},"location":"Maoming, China","end":{"date-parts":[[2014,8,16]]}},"container-title":["9th International Conference on Communications and Networking in China"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/7043683\/7054242\/07054316.pdf?arnumber=7054316","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,5,20]],"date-time":"2025-05-20T21:04:03Z","timestamp":1747775043000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/7054316\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014,8]]},"references-count":33,"URL":"https:\/\/doi.org\/10.1109\/chinacom.2014.7054316","relation":{},"subject":[],"published":{"date-parts":[[2014,8]]}}}