{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,23]],"date-time":"2024-10-23T05:30:05Z","timestamp":1729661405335,"version":"3.28.0"},"reference-count":15,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2015,6]]},"DOI":"10.1109\/ecai.2015.7301209","type":"proceedings-article","created":{"date-parts":[[2015,10,26]],"date-time":"2015-10-26T18:15:02Z","timestamp":1445883302000},"page":"WSD-15-WSD-18","source":"Crossref","is-referenced-by-count":1,"title":["Touch based biometric authentication for Android devices"],"prefix":"10.1109","author":[{"given":"Alexandru-Cosmin","family":"Grivei","sequence":"first","affiliation":[]}],"member":"263","reference":[{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/HASE.2015.10"},{"article-title":"Modular Biometric Authentication Service System","year":"0","author":"witte","key":"ref11"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/CNS.2014.6997513"},{"key":"ref13","article-title":"TouchLogger: Inferring Keystrokes On Touch Screen From Smartphone Motion","author":"liang","year":"2011","journal-title":"HotSec&#x2019; 11 Proceedings of the 6th USENIX conference on Hot topics in security"},{"article-title":"Continous User Identification via Touch and Movement Behavioral Biometrics","year":"2014","author":"cheng","key":"ref14"},{"key":"ref15","article-title":"Gesture Recognition System using Hidden Markov Models with user Definable Vocabulary","author":"gritzman","year":"2013","journal-title":"ECAI"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1016\/j.accinf.2005.10.003"},{"key":"ref3","doi-asserted-by":"crossref","first-page":"1565","DOI":"10.1016\/j.asoc.2010.08.003","article-title":"Biometric personal authentication using keystroke dynamics: A review","volume":"11","author":"kaman","year":"2011","journal-title":"Phil Applied Soft Computing"},{"key":"ref6","doi-asserted-by":"crossref","first-page":"36","DOI":"10.1016\/j.istr.2012.02.001","article-title":"Continous keystroke dynamics: A different perspective","author":"bours","year":"2012","journal-title":"Information Security Technical Report"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/ISI.2009.5137288"},{"key":"ref8","first-page":"665","article-title":"A Bioinformatics Based Approach to Behavioral Biometrics, Frontiers in the Convergence of Bioscience and Information Technologies","author":"revett","year":"2007"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/MSP.2004.89"},{"article-title":"Smatphone Security: Trends and Predictions","year":"2011","author":"wallach","key":"ref2"},{"key":"ref1","first-page":"987","article-title":"Touch me once and I know it's you! Implicit Authentication based on Touch Screen Patterns","author":"de luca","year":"2012","journal-title":"CHI 2012"},{"key":"ref9","first-page":"22","article-title":"Distinguishing Users with Capacitive Touch Communication","author":"tam","year":"2012","journal-title":"MobiCom'12"}],"event":{"name":"2015 7th International Conference on Electronics, Computers and Artificial Intelligence (ECAI)","start":{"date-parts":[[2015,6,25]]},"location":"Bucharest, Romania","end":{"date-parts":[[2015,6,27]]}},"container-title":["2015 7th International Conference on Electronics, Computers and Artificial Intelligence (ECAI)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/7297040\/7301133\/07301209.pdf?arnumber=7301209","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,6,23]],"date-time":"2017-06-23T18:15:38Z","timestamp":1498241738000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/7301209\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015,6]]},"references-count":15,"URL":"https:\/\/doi.org\/10.1109\/ecai.2015.7301209","relation":{},"subject":[],"published":{"date-parts":[[2015,6]]}}}