{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,25]],"date-time":"2025-06-25T13:51:09Z","timestamp":1750859469647,"version":"3.28.0"},"reference-count":12,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2014,7]]},"DOI":"10.1109\/pst.2014.6890968","type":"proceedings-article","created":{"date-parts":[[2014,9,10]],"date-time":"2014-09-10T15:43:34Z","timestamp":1410363814000},"page":"407-413","source":"Crossref","is-referenced-by-count":7,"title":["i\/k-Contact: A context-aware user authentication using physical social trust"],"prefix":"10.1109","author":[{"given":"Shiori","family":"Arimura","sequence":"first","affiliation":[]},{"given":"Masahiro","family":"Fujita","sequence":"additional","affiliation":[]},{"given":"Shinya","family":"Kobayashi","sequence":"additional","affiliation":[]},{"given":"Junya","family":"Kani","sequence":"additional","affiliation":[]},{"given":"Masakatsu","family":"Nishigaki","sequence":"additional","affiliation":[]},{"given":"Akira","family":"Shiba","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"3","first-page":"178","article-title":"Context desktop technology","volume":"49","author":"matsumoto","year":"2013","journal-title":"FUJITSU Sci Tech J"},{"key":"2","doi-asserted-by":"crossref","first-page":"304","DOI":"10.1007\/3-540-48157-5_29","article-title":"Toward a better understanding of context and context-awareness","author":"abowd","year":"1999","journal-title":"Symp Handheld and Ubiquitous Computing"},{"journal-title":"Gait As A Biometric for Person Identification in Video Sequences","year":"2001","author":"abdelkader","key":"10"},{"year":"2013","key":"1"},{"key":"7","doi-asserted-by":"publisher","DOI":"10.1145\/1182475.1182529"},{"key":"6","first-page":"1285","article-title":"Location-baced authentication and authorization using smart phone","author":"zhang","year":"2012","journal-title":"Conf Trust Security and Privacy in Computing and Communication"},{"journal-title":"The Future of Information Security is Context Aware and Adaptive","year":"2010","key":"5"},{"key":"4","first-page":"66","article-title":"Technology to manage indoor locations","volume":"64","author":"okuyama","year":"2013","journal-title":"FUJITSU Sci Tech J"},{"journal-title":"Risk-Baced Authentication","year":"2013","key":"9"},{"key":"8","first-page":"264","article-title":"The authentication system using lifelog","author":"ishihara","year":"2007","journal-title":"Symp DICOMO2007"},{"key":"11","first-page":"97","article-title":"Application push &play proposal on dynamic execution environment combined with personal devices and cloud computing","author":"ito","year":"2011","journal-title":"Conf IWIN"},{"journal-title":"New Technological Devices Lead to Decline in Social Skills","year":"2011","key":"12"}],"event":{"name":"2014 Twelfth Annual Conference on Privacy, Security and Trust (PST)","start":{"date-parts":[[2014,7,23]]},"location":"Toronto, ON, Canada","end":{"date-parts":[[2014,7,24]]}},"container-title":["2014 Twelfth Annual International Conference on Privacy, Security and Trust"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6883276\/6890911\/06890968.pdf?arnumber=6890968","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,6,22]],"date-time":"2017-06-22T20:12:51Z","timestamp":1498162371000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/6890968\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014,7]]},"references-count":12,"URL":"https:\/\/doi.org\/10.1109\/pst.2014.6890968","relation":{},"subject":[],"published":{"date-parts":[[2014,7]]}}}