{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,9]],"date-time":"2026-04-09T14:30:30Z","timestamp":1775745030895,"version":"3.50.1"},"reference-count":28,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2017,2]]},"DOI":"10.1109\/isba.2017.7947684","type":"proceedings-article","created":{"date-parts":[[2017,6,15]],"date-time":"2017-06-15T22:35:15Z","timestamp":1497566115000},"page":"1-8","source":"Crossref","is-referenced-by-count":35,"title":["Please hold on: Unobtrusive user authentication using smartphone's built-in sensors"],"prefix":"10.1109","author":[{"given":"Attaullah","family":"Buriro","sequence":"first","affiliation":[]},{"given":"Bruno","family":"Crispo","sequence":"additional","affiliation":[]},{"given":"Yury","family":"Zhauniarovich","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1145\/2501604.2501607"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/ANZIIS.1994.396988"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1145\/2639108.2639141"},{"key":"ref13","article-title":"Unobservable re-authentication for smartphones","author":"li","year":"2013","journal-title":"NDSS"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1145\/1869983.1869992"},{"key":"ref15","author":"mahbub","year":"0","journal-title":"Active user authentication for smartphones A challenge data set and benchmark results"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/ICASSP.2005.1415569"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2016.2557846"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/MPRV.2011.28"},{"key":"ref19","first-page":"301","article-title":"Progressive Authentication: Deciding When to Authenticate on Mobile Phones","author":"riva","year":"2012","journal-title":"Proceedings of the 21st USENIX Conference on Security Symposium"},{"key":"ref28","first-page":"1128","article-title":"Sensec: Mobile security through passive sensing","author":"zhu","year":"2013","journal-title":"Computing Networking and Communications (ICNC) 2013 International Conference"},{"key":"ref4","author":"buriro","year":"0","journal-title":"Hold & sign A novel behavioral biometrics for smartphone user authentication"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2014.2300482"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1145\/2037373.2037383"},{"key":"ref6","doi-asserted-by":"crossref","first-page":"27","DOI":"10.1007\/978-3-319-23222-5_4","article-title":"Touchstroke: Smartphone user authentication based on touch-typing biometrics","author":"buriro","year":"2015","journal-title":"New Trends in Image Analysis and Processing-ICIAP 2015 Workshops"},{"key":"ref5","first-page":"45","article-title":"Itsme: Multi-modal and unobtrusive behavioural user authentication for smartphones","author":"buriro","year":"2015","journal-title":"International Conference on Passwords"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1145\/2702123.2702141"},{"key":"ref7","first-page":"249","article-title":"Mind how you answer me!: transparently authenticating the user of a smartphone when answering or placing a call","author":"conti","year":"2011","journal-title":"Proceedings of the 6th ACM Symposium on Information Computer and Communications Security"},{"key":"ref2","first-page":"1","article-title":"Smudge attacks on smartphone touch screens","author":"aviv","year":"2010","journal-title":"Proceedings of the 4th USENIX Conference on Offensive Technologies"},{"key":"ref9","first-page":"213","article-title":"It's a Hard Lock Life: A Field Study of Smartphone (Un)Locking Behavior and Risk Perception","author":"harbach","year":"2014","journal-title":"Proceedings of the Symposium On Usable Privacy and Security"},{"key":"ref1","year":"0","journal-title":"Mobile users can't leave their phone alone for six minutes and check it up to 150 times a day"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1145\/2406367.2406384"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1109\/WiMOB.2011.6085412"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/WiMOB.2011.6085412"},{"key":"ref24","doi-asserted-by":"crossref","first-page":"228","DOI":"10.1016\/j.patcog.2013.06.028","article-title":"The Largest Inertial Sensor-based Gait Database and Performance Evaluation of Gait-based Personal Authentication","volume":"47","author":"thanh","year":"2014","journal-title":"Pattern Recognition"},{"key":"ref23","article-title":"Hmog: A new biometric modality for continuous authentication of smartphone users","author":"sitova","year":"2015","journal-title":"ar Xiv preprint arXiv 1501 01199"},{"key":"ref26","article-title":"Towards continuous and passive authentication via touch biometrics: An experimental study on smart-phones","author":"xu","year":"2014","journal-title":"Symposium On Usable Privacy and Security (SOUPS 2014) USENIX Association"},{"key":"ref25","first-page":"81","article-title":"All Your Droid Are Belong to Us: A Survey of Current Android Attacks","author":"vidas","year":"2011","journal-title":"Proceedings of the 5th USENIX Conference on Offensive Technologies"}],"event":{"name":"2017 IEEE International Conference on Identity, Security and Behavior Analysis (ISBA)","location":"New Delhi, India","start":{"date-parts":[[2017,2,22]]},"end":{"date-parts":[[2017,2,24]]}},"container-title":["2017 IEEE International Conference on Identity, Security and Behavior Analysis (ISBA)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/7938565\/7947678\/07947684.pdf?arnumber=7947684","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,9,26]],"date-time":"2019-09-26T04:30:30Z","timestamp":1569472230000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/7947684\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017,2]]},"references-count":28,"URL":"https:\/\/doi.org\/10.1109\/isba.2017.7947684","relation":{},"subject":[],"published":{"date-parts":[[2017,2]]}}}