{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,10]],"date-time":"2026-02-10T19:52:30Z","timestamp":1770753150341,"version":"3.50.0"},"reference-count":10,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2015,3]]},"DOI":"10.1109\/isba.2015.7126361","type":"proceedings-article","created":{"date-parts":[[2015,6,18]],"date-time":"2015-06-18T20:04:45Z","timestamp":1434657885000},"page":"1-7","source":"Crossref","is-referenced-by-count":20,"title":["Effect of data size on performance of free-text keystroke authentication"],"prefix":"10.1109","author":[{"given":"Jiaju","family":"Huang","sequence":"first","affiliation":[]},{"given":"Daqing","family":"Hou","sequence":"additional","affiliation":[]},{"given":"Stephanie","family":"Schuckers","sequence":"additional","affiliation":[]},{"given":"Zhenhao","family":"Hou","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-15512-3_14"},{"key":"ref3","author":"jain","year":"1999","journal-title":"Biometrics Personal Identification in Networked Society"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/BTAS.2014.6996259"},{"key":"ref6","doi-asserted-by":"crossref","first-page":"281","DOI":"10.1007\/978-0-387-73003-5_39","article-title":"Evaluation of gait recognition","author":"sarkar","year":"2009","journal-title":"Encyclopedia of Biometrics"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1016\/S0020-7373(05)80165-8"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1016\/j.patcog.2003.11.012"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1007\/978-1-84996-202-5"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1145\/1085126.1085129"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1007\/11867661_24"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1016\/S0031-3203(99)00197-1"}],"event":{"name":"IEEE International Conference on Identity, Security and Behavior Analysis (ISBA 2015)","location":"Hong Kong","start":{"date-parts":[[2015,3,23]]},"end":{"date-parts":[[2015,3,25]]}},"container-title":["IEEE International Conference on Identity, Security and Behavior Analysis (ISBA 2015)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/7118006\/7126341\/07126361.pdf?arnumber=7126361","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,9,3]],"date-time":"2020-09-03T20:08:14Z","timestamp":1599163694000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/7126361\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015,3]]},"references-count":10,"URL":"https:\/\/doi.org\/10.1109\/isba.2015.7126361","relation":{},"subject":[],"published":{"date-parts":[[2015,3]]}}}