{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,28]],"date-time":"2026-02-28T00:09:29Z","timestamp":1772237369312,"version":"3.50.1"},"reference-count":17,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2015,1]]},"DOI":"10.1109\/icmu.2015.7061060","type":"proceedings-article","created":{"date-parts":[[2015,3,17]],"date-time":"2015-03-17T23:16:22Z","timestamp":1426634182000},"page":"161-166","source":"Crossref","is-referenced-by-count":7,"title":["Passive user identification using sequential analysis of proximity information in touchscreen usage patterns"],"prefix":"10.1109","author":[{"given":"Vadim","family":"Zaliva","sequence":"first","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"William","family":"Melicher","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Shayan","family":"Saha","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Joy","family":"Zhang","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"263","reference":[{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1145\/1982185.1982190"},{"key":"ref11","first-page":"201","article-title":"Keystroke biometrics with number- pad input","author":"maxion","year":"2010","journal-title":"2010 IEEE IEEE\/IFIP"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1145\/2557500.2557503"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/MSP.2004.89"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2005.373"},{"key":"ref15","author":"wald","year":"2004","journal-title":"Sequential Analysis"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/ICARCV.2012.6485185"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1145\/2557500.2557525"},{"key":"ref4","article-title":"Passive User Authentication through Micro-behavior Modeling of Soft Keyboard Interaction","author":"draffin","year":"2013","journal-title":"Proceedings of MobiCASE 2013 Fifth International Conference on Mobile Computing Applications and Services"},{"key":"ref3","article-title":"Authenticating mobile phone users using keystroke analysis","author":"clarke","year":"2007","journal-title":"International Journal of Information Security"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2012.2225048"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1145\/2565585.2565592"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/DSN.2009.5270346"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/BTAS.2009.5339028"},{"key":"ref2","doi-asserted-by":"crossref","DOI":"10.1093\/oso\/9780198538493.001.0001","author":"bishop","year":"1995","journal-title":"Neural Networks for Pattern Recognition"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.13176\/11.427"},{"key":"ref9","author":"kondik","year":"2013","journal-title":"android community ROM based on Jelly Bean"}],"event":{"name":"2015 Eighth International Conference on Mobile Computing and Ubiquitous Networking (ICMU)","location":"Hakodate, Japan","start":{"date-parts":[[2015,1,20]]},"end":{"date-parts":[[2015,1,22]]}},"container-title":["2015 Eighth International Conference on Mobile Computing and Ubiquitous Networking (ICMU)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/7052531\/7061015\/07061060.pdf?arnumber=7061060","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,5,21]],"date-time":"2025-05-21T01:58:16Z","timestamp":1747792696000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/7061060"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015,1]]},"references-count":17,"URL":"https:\/\/doi.org\/10.1109\/icmu.2015.7061060","relation":{},"subject":[],"published":{"date-parts":[[2015,1]]}}}