{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,8,8]],"date-time":"2024-08-08T07:05:00Z","timestamp":1723100700944},"reference-count":12,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2015,8]]},"DOI":"10.1109\/ic3.2015.7346651","type":"proceedings-article","created":{"date-parts":[[2015,12,8]],"date-time":"2015-12-08T22:17:05Z","timestamp":1449613025000},"source":"Crossref","is-referenced-by-count":10,"title":["User verification using safe handwritten passwords on smartphones"],"prefix":"10.1109","author":[{"given":"Tobias","family":"Kutzner","sequence":"first","affiliation":[]},{"family":"Fanyu Ye","sequence":"additional","affiliation":[]},{"given":"Ingrid","family":"Bonninger","sequence":"additional","affiliation":[]},{"given":"Carlos","family":"Travieso","sequence":"additional","affiliation":[]},{"family":"Malay Kishore Dutta","sequence":"additional","affiliation":[]},{"given":"Anushikha","family":"Singh","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/ITI.2007.4283767"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/NCVPRIPG.2013.6776170"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1142\/S0218001406004831"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/CIBIM.2011.5949215"},{"key":"ref11","first-page":"1","article-title":"Writer identification on mobile device based on handwritten","author":"tobias","year":"2013","journal-title":"2013 47th International Carnahan Conference on Security Technology (ICCST) ICCST"},{"key":"ref5","first-page":"4487","article-title":"USign &#x2014; A security enhanced electronic consent model","author":"li","year":"2014","journal-title":"36th Annu Int Conf IEEE Eng Medicine Biology"},{"key":"ref12","author":"gu","year":"2012","journal-title":"Generalized Fisher Score for Feature Selection"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/CSIT.2014.6805997"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/ITST.2013.6685567"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/HAVE.2011.6088410"},{"key":"ref9","author":"kutzner","year":"2012","journal-title":"Biometric Handwriting Password Recognition for Mobile Devices as Client-Server solution"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/ICECTECH.2011.5941654"}],"event":{"name":"2015 Eighth International Conference on Contemporary Computing (IC3)","location":"Noida, India","start":{"date-parts":[[2015,8,20]]},"end":{"date-parts":[[2015,8,22]]}},"container-title":["2015 Eighth International Conference on Contemporary Computing (IC3)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/7337021\/7346637\/07346651.pdf?arnumber=7346651","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,10,14]],"date-time":"2020-10-14T14:17:15Z","timestamp":1602685035000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/7346651"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015,8]]},"references-count":12,"URL":"https:\/\/doi.org\/10.1109\/ic3.2015.7346651","relation":{},"subject":[],"published":{"date-parts":[[2015,8]]}}}