{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,13]],"date-time":"2025-11-13T07:14:32Z","timestamp":1763018072975,"version":"3.37.3"},"reference-count":20,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"5","license":[{"start":{"date-parts":[[2019,9,1]],"date-time":"2019-09-01T00:00:00Z","timestamp":1567296000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2019,9,1]],"date-time":"2019-09-01T00:00:00Z","timestamp":1567296000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2019,9,1]],"date-time":"2019-09-01T00:00:00Z","timestamp":1567296000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"DOI":"10.13039\/501100000038","name":"Natural Sciences and Engineering Research Council of Canada","doi-asserted-by":"publisher","id":[{"id":"10.13039\/501100000038","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Internet Comput."],"published-print":{"date-parts":[[2019,9,1]]},"DOI":"10.1109\/mic.2019.2941391","type":"journal-article","created":{"date-parts":[[2019,9,13]],"date-time":"2019-09-13T20:22:06Z","timestamp":1568406126000},"page":"18-28","source":"Crossref","is-referenced-by-count":12,"title":["Contextual, Behavioral, and Biometric Signatures for Continuous Authentication"],"prefix":"10.1109","volume":"23","author":[{"given":"Kyle","family":"Quintal","sequence":"first","affiliation":[{"name":"School of Electrical Engineering and Computer ScienceUniversity of Ottawa"}]},{"given":"Burak","family":"Kantarci","sequence":"additional","affiliation":[{"name":"School of Electrical Engineering and Computer ScienceUniversity of Ottawa"}]},{"given":"Melike","family":"Erol-Kantarci","sequence":"additional","affiliation":[{"name":"School of Electrical Engineering and Computer ScienceUniversity of Ottawa"}]},{"given":"Andrew","family":"Malton","sequence":"additional","affiliation":[{"name":"BlackBerry Limited"}]},{"given":"Andrew","family":"Walenstein","sequence":"additional","affiliation":[{"name":"BlackBerry Limited"}]}],"member":"263","reference":[{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/JSYST.2015.2472579"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/EUC.2011.2"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/MIC.2017.33"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/MCC.2018.1081072"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1145\/3032970.3032987"},{"key":"ref15","first-page":"32:1","article-title":"Revisiting context-based authentication in IoT","author":"miettinen","year":"0","journal-title":"Proc 55th Annu Des Autom Conf"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1145\/2695664.2695908"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/WINCOM.2016.7777227"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/TII.2018.2808190"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/TrustCom.2011.5"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.17485\/ijst\/2016\/v9i48\/89396"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1016\/B978-0-12-803843-7.00050-8"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/MSP.2016.2555335"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1016\/j.patrec.2015.12.013"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/EST.2013.38"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2017.2651741"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1145\/3265863.3265873"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2017.2719706"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/TAES.1981.309178"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1145\/2660267.2660334"}],"container-title":["IEEE Internet Computing"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/4236\/8935548\/08836081.pdf?arnumber=8836081","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,7,13]],"date-time":"2022-07-13T20:53:37Z","timestamp":1657745617000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/8836081\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,9,1]]},"references-count":20,"journal-issue":{"issue":"5"},"URL":"https:\/\/doi.org\/10.1109\/mic.2019.2941391","relation":{},"ISSN":["1089-7801","1941-0131"],"issn-type":[{"type":"print","value":"1089-7801"},{"type":"electronic","value":"1941-0131"}],"subject":[],"published":{"date-parts":[[2019,9,1]]}}}