{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,30]],"date-time":"2024-10-30T08:21:42Z","timestamp":1730276502660,"version":"3.28.0"},"reference-count":26,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2016,8]]},"DOI":"10.1109\/issa.2016.7802933","type":"proceedings-article","created":{"date-parts":[[2017,1,2]],"date-time":"2017-01-02T21:21:42Z","timestamp":1483392102000},"page":"85-90","source":"Crossref","is-referenced-by-count":2,"title":["Context Aware Mobile Application for mobile devices"],"prefix":"10.1109","author":[{"given":"Mfundo","family":"Masango","sequence":"first","affiliation":[]},{"given":"Francois","family":"Mouton","sequence":"additional","affiliation":[]},{"given":"Alastair","family":"Nottingham","sequence":"additional","affiliation":[]},{"given":"Jabu","family":"Mtsweni","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1145\/1964897.1964918"},{"key":"ref11","article-title":"A novel approach for android security system","volume":"1","author":"malhotra","year":"2016","journal-title":"International Journal of Computer Science, Engineering and Applications"},{"journal-title":"How to set up face unlock on your android phone Androidcentral [Online]","year":"2012","author":"mazo","key":"ref12"},{"journal-title":"How to setup a lock-screen pattern pin or password on your android device [android 101] Phandroid","year":"2014","author":"kennemer","key":"ref13"},{"key":"ref14","first-page":"128","article-title":"Face recognition system on android using eigenface method","volume":"61","author":"oka","year":"2014","journal-title":"Journal of Theoretical & Applied Information Technology"},{"journal-title":"Dissecting lollipops smart lock Google [Online]","year":"2014","author":"elenkov","key":"ref15"},{"journal-title":"On-body detection explained Androidcentral","year":"2015","author":"duino","key":"ref16"},{"key":"ref17","first-page":"420","article-title":"Random password generation of otp system using changed location and angle of fingerprint features","author":"cha","year":"0"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1145\/2207676.2208544"},{"key":"ref19","first-page":"1","article-title":"A concepstual model for federated authentication in the cloud","author":"alabdulwahid","year":"2013","journal-title":"Proceedings of the 11th Australian Information Security Management Conference SRI Security Research Institute Edith Cowan University Perth"},{"journal-title":"Garmin What Is GPS?","year":"2016","key":"ref4"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1145\/2632048.2636093"},{"journal-title":"Using google api Google","year":"2016","key":"ref6"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/Trustcom.2015.461"},{"journal-title":"Android 5 0 feature Google updates smart lock on lollipop to include trusted places Droidlife","year":"2014","key":"ref8"},{"journal-title":"Geolocation api specification Google Inc","year":"2013","author":"popescu","key":"ref7"},{"journal-title":"What is geofencing? GeoMarketing [Online]","year":"2016","author":"chamberlain","key":"ref2"},{"journal-title":"Gesture recognition for mobile phone unlocking","year":"2014","author":"sixta","key":"ref9"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/MIC.2005.22"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/PST.2013.6596095"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1109\/PST.2013.6596095"},{"journal-title":"Context and bio-aware mobile applications","year":"2011","author":"mitchell","key":"ref21"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1109\/98.626984"},{"journal-title":"Smartwatch User Identification as a Means of Authentication","year":"2016","author":"davidson","key":"ref23"},{"journal-title":"Can't remember last night? google's location history can tell where you were Trendblog","year":"2016","author":"knoll","key":"ref26"},{"journal-title":"Android Security","year":"2015","author":"heinl","key":"ref25"}],"event":{"name":"2016 Information Security for South Africa (ISSA)","start":{"date-parts":[[2016,8,17]]},"location":"Johannesburg, South Africa","end":{"date-parts":[[2016,8,18]]}},"container-title":["2016 Information Security for South Africa (ISSA)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/7786562\/7802913\/07802933.pdf?arnumber=7802933","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,1,11]],"date-time":"2017-01-11T00:24:53Z","timestamp":1484094293000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/7802933\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016,8]]},"references-count":26,"URL":"https:\/\/doi.org\/10.1109\/issa.2016.7802933","relation":{},"subject":[],"published":{"date-parts":[[2016,8]]}}}