{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,29]],"date-time":"2025-10-29T12:22:08Z","timestamp":1761740528066,"version":"3.28.0"},"reference-count":30,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2014,8]]},"DOI":"10.1109\/iwcmc.2014.6906343","type":"proceedings-article","created":{"date-parts":[[2014,9,30]],"date-time":"2014-09-30T14:59:25Z","timestamp":1412089165000},"page":"122-127","source":"Crossref","is-referenced-by-count":9,"title":["A roadmap to continuous biometric authentication on mobile devices"],"prefix":"10.1109","author":[{"given":"Marlies","family":"Rybnicek","sequence":"first","affiliation":[]},{"given":"Christoph","family":"Lang-Muhr","sequence":"additional","affiliation":[]},{"given":"Daniel","family":"Haslinger","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"19","doi-asserted-by":"publisher","DOI":"10.1109\/SERE.2012.37"},{"key":"17","doi-asserted-by":"publisher","DOI":"10.1145\/1655062.1655066"},{"key":"18","doi-asserted-by":"publisher","DOI":"10.1145\/1999995.2000053"},{"key":"15","doi-asserted-by":"publisher","DOI":"10.5772\/51319"},{"key":"16","doi-asserted-by":"publisher","DOI":"10.1109\/IIH-MSP.2012.11"},{"key":"13","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2012.2225048"},{"key":"14","doi-asserted-by":"publisher","DOI":"10.1109\/THS.2012.6459891"},{"key":"11","doi-asserted-by":"publisher","DOI":"10.1145\/2207676.2208543"},{"key":"12","doi-asserted-by":"crossref","first-page":"130","DOI":"10.1007\/978-3-642-31668-5_10","article-title":"Exploring touch-screen biometrics for user identification on smart phones","volume":"375","author":"angulo","year":"2012","journal-title":"Privacy and Identity Management for Life Ser IFIP Advances in Information and Communication"},{"key":"21","doi-asserted-by":"crossref","first-page":"99","DOI":"10.1007\/978-3-642-18178-8_9","article-title":"Implicit authentication through learning user behavior","author":"shi","year":"2011","journal-title":"Information Security"},{"key":"20","article-title":"Implicit authentication for mobile devices","author":"jakobsson","year":"2009","journal-title":"Proceedings of the 4th USENIX Conference on Hot Topics in Security"},{"key":"22","first-page":"1128","article-title":"Sensec: Mobile security through passive sensing","author":"zhu","year":"2013","journal-title":"International Conference on Computing Networking and Communications (ICNC"},{"key":"23","doi-asserted-by":"publisher","DOI":"10.1109\/WiMOB.2011.6085412"},{"key":"24","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-30436-1_38"},{"key":"25","doi-asserted-by":"crossref","first-page":"249","DOI":"10.1145\/1966913.1966945","article-title":"Mind how you answer me: Transparently authenticating the user of a smartphone when answering or placing a call","author":"conti","year":"2011","journal-title":"Proceedings of the 6th ACM Symposium on Information Computer and Communications Security"},{"key":"26","doi-asserted-by":"publisher","DOI":"10.1007\/978-0-387-73003-5"},{"key":"27","doi-asserted-by":"publisher","DOI":"10.1145\/1555816.1555835"},{"journal-title":"Apple Inc","year":"2013","key":"28"},{"key":"29","first-page":"187","article-title":"Silentsense: Silent user identification via touch and movement behavioral biometrics","author":"bo","year":"2013","journal-title":"Proceedings of the 19th Annual International Conference on Mobile Computing &"},{"key":"3","doi-asserted-by":"publisher","DOI":"10.1109\/MCOM.2010.5560598"},{"volume":"9","journal-title":"National Science and Technology Council Tech Rep","year":"2006","key":"2"},{"key":"10","doi-asserted-by":"publisher","DOI":"10.1145\/2207676.2208544"},{"journal-title":"Apple Inc","year":"2014","key":"1"},{"key":"30","first-page":"57","article-title":"Classification of acceleration data for biometric gait recognition on mobile devices","author":"nickel","year":"2011","journal-title":"Proceedings of the Special Interest Group on Biometrics and Electronic Signatures"},{"key":"7","doi-asserted-by":"publisher","DOI":"10.5121\/ijcsit.2012.4501"},{"key":"6","doi-asserted-by":"publisher","DOI":"10.1109\/CCNC.2009.4784783"},{"key":"5","doi-asserted-by":"publisher","DOI":"10.1109\/ICCEE.2008.157"},{"key":"4","doi-asserted-by":"publisher","DOI":"10.1109\/SURV.2012.031412.00077"},{"key":"9","doi-asserted-by":"crossref","first-page":"224","DOI":"10.1007\/978-3-642-04342-0_12","article-title":"Keystrokebased user identification on smart phones","author":"zahid","year":"2009","journal-title":"Proceedings of the 12th International Symposium on Recent Advances in Intrusion Detection"},{"key":"8","article-title":"Deployment of keystroke analysis on a smartphone","author":"buchoux","year":"2008","journal-title":"Australian Information Security Management Conference"}],"event":{"name":"2014 International Wireless Communications and Mobile Computing Conference (IWCMC)","start":{"date-parts":[[2014,8,4]]},"location":"Nicosia, Cyprus","end":{"date-parts":[[2014,8,8]]}},"container-title":["2014 International Wireless Communications and Mobile Computing Conference (IWCMC)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6895209\/6906315\/06906343.pdf?arnumber=6906343","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,4,18]],"date-time":"2022-04-18T12:07:37Z","timestamp":1650283657000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/6906343"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014,8]]},"references-count":30,"URL":"https:\/\/doi.org\/10.1109\/iwcmc.2014.6906343","relation":{},"subject":[],"published":{"date-parts":[[2014,8]]}}}