{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,6]],"date-time":"2024-09-06T00:58:54Z","timestamp":1725584334077},"reference-count":45,"publisher":"IEEE","license":[{"start":{"date-parts":[[2020,5,1]],"date-time":"2020-05-01T00:00:00Z","timestamp":1588291200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2020,5,1]],"date-time":"2020-05-01T00:00:00Z","timestamp":1588291200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2020,5,1]],"date-time":"2020-05-01T00:00:00Z","timestamp":1588291200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2020,5]]},"DOI":"10.1109\/dessert50317.2020.9125076","type":"proceedings-article","created":{"date-parts":[[2020,6,25]],"date-time":"2020-06-25T20:46:07Z","timestamp":1593117967000},"page":"95-101","source":"Crossref","is-referenced-by-count":0,"title":["Evaluation system for user authentication methods on mobile devices"],"prefix":"10.1109","author":[{"given":"Dmytro","family":"Progonov","sequence":"first","affiliation":[]},{"given":"Veronika","family":"Prokhorchuk","sequence":"additional","affiliation":[]},{"given":"Andriy","family":"Oliynyk","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2016.2574309"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2016.374"},{"journal-title":"CASIA Iris Image Database","article-title":"Center for Biometric and Security Research","year":"0","key":"ref33"},{"journal-title":"MMU Database","year":"0","key":"ref32"},{"journal-title":"Sokoto Coventry Fingerprint Dataset","year":"0","author":"shehu","key":"ref31"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.21437\/Interspeech.2018-1929"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-01793-3_21"},{"key":"ref36","first-page":"77","article-title":"GavabDB: a 3D Face Database","author":"moreno","year":"2004","journal-title":"Proc COST Workshop on Biometrics on the Internet Fundamentals Advances and Applications"},{"key":"ref35","first-page":"856","author":"comon","year":"2008","journal-title":"Handbook of Blind Source Separation Independent Component Analysis and Applications"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1007\/978-1-4614-6396-2"},{"key":"ref10","article-title":"Data Driven Authentication: On the Effectiveness of User Behaviour Modelling with Mobile Device Sensors","author":"kayac?k","year":"2014","journal-title":"Mobile Security Technologies Workshop (MoST)"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.1109\/TIP.2016.2616281"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-18178-8_9"},{"journal-title":"UK Cyber Survey","year":"2019","key":"ref12"},{"key":"ref13","article-title":"Tell me who you are, and I will tell you what your graphic password looks like","author":"dybevik","year":"2015","journal-title":"Technical Report NTNU"},{"journal-title":"Samsung Galaxy S10 Fingerprint Scanner Hacked &#x2013; Here's What You Need To Know","year":"2019","author":"winder","key":"ref14"},{"key":"ref15","article-title":"Hackers Say They've Broken Face ID a Week After iPhone X Release","author":"greenberg","year":"2019","journal-title":"Wired Cond&#x00E9; Nast"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2019.2911170"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1007\/978-0-85729-805-8"},{"key":"ref18","first-page":"590","author":"obaidat","year":"2018","journal-title":"Biometric-Based Physical and Cybersecurity Systems"},{"key":"ref19","first-page":"16","article-title":"Authentication of Smartphone Users Based on the Way They Walk Using kNN Algorithm","author":"nickel","year":"2012","journal-title":"Proc IIH-MSP Conf"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1109\/34.879790"},{"journal-title":"Federal Financial Institutions Examination Council","article-title":"Authentication in an Internet Banking Environment","year":"2008","key":"ref4"},{"key":"ref27","first-page":"1104","author":"murphy","year":"2012","journal-title":"Machine Learning A Probabilistic Perspective"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/THS.2016.7568965"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.5120\/ijca2015907389"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.5244\/C.29.41"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1007\/978-1-4899-7488-4"},{"journal-title":"Secure pick up Implicit authentication when you start using the smartphone","year":"2019","author":"lee","key":"ref8"},{"journal-title":"Dynamic Anonymized Evaluation for Behavioral Continuous Authentication","year":"2019","author":"manandhar","key":"ref7"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/MITP.2013.49"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/PERCOMW.2018.8480381"},{"key":"ref1","first-page":"730","article-title":"Off-line NFC Tag Authentication","author":"saeed","year":"2012","journal-title":"Proc ICIT Conf"},{"journal-title":"The Behaviosec Inc website","year":"2019","key":"ref20"},{"key":"ref45","doi-asserted-by":"publisher","DOI":"10.1145\/342009.335388"},{"journal-title":"The SecuredTouch Inc website","year":"2019","key":"ref22"},{"journal-title":"The BioCatch Inc website","year":"2019","key":"ref21"},{"key":"ref42","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2001.990517"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1016\/j.jisa.2017.10.002"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.1214\/aoms\/1177728190"},{"journal-title":"The Biometric Signature ID Inc website","year":"2019","key":"ref23"},{"key":"ref44","doi-asserted-by":"publisher","DOI":"10.25080\/Majora-7b98e3ed-003"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1109\/BSN.2015.7299423"},{"key":"ref43","doi-asserted-by":"publisher","DOI":"10.1186\/s13040-017-0155-3"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.23919\/FRUCT.2017.8071293"}],"event":{"name":"2020 IEEE 11th International Conference on Dependable Systems, Services and Technologies (DESSERT)","start":{"date-parts":[[2020,5,14]]},"location":"Kyiv, Ukraine","end":{"date-parts":[[2020,5,18]]}},"container-title":["2020 IEEE 11th International Conference on Dependable Systems, Services and Technologies (DESSERT)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/9122248\/9124995\/09125076.pdf?arnumber=9125076","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,6,27]],"date-time":"2022-06-27T15:42:58Z","timestamp":1656344578000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9125076\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,5]]},"references-count":45,"URL":"https:\/\/doi.org\/10.1109\/dessert50317.2020.9125076","relation":{},"subject":[],"published":{"date-parts":[[2020,5]]}}}