{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,30]],"date-time":"2024-10-30T12:26:36Z","timestamp":1730291196032,"version":"3.28.0"},"reference-count":21,"publisher":"IEEE","license":[{"start":{"date-parts":[[2021,12,13]],"date-time":"2021-12-13T00:00:00Z","timestamp":1639353600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2021,12,13]],"date-time":"2021-12-13T00:00:00Z","timestamp":1639353600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2021,12,13]],"date-time":"2021-12-13T00:00:00Z","timestamp":1639353600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2021,12,13]]},"DOI":"10.1109\/pst52912.2021.9647739","type":"proceedings-article","created":{"date-parts":[[2021,12,21]],"date-time":"2021-12-21T21:08:01Z","timestamp":1640120881000},"page":"1-10","source":"Crossref","is-referenced-by-count":0,"title":["PUPy: A Generalized, Optimistic Context Detection Framework for Implicit Authentication"],"prefix":"10.1109","author":[{"given":"Matthew","family":"Rafuse","sequence":"first","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Urs","family":"Hengartner","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"263","reference":[{"key":"ref10","first-page":"99","article-title":"Implicit authentication through learning user behavior","author":"shi","year":"2010","journal-title":"In International Conference on Information Security (ISC"},{"key":"ref11","article-title":"Progressive authentication: deciding when to authenticate on mobile phones","author":"riva","year":"2012","journal-title":"21st USENIX Security Symposium"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1145\/2500423.2504572"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2012.2225048"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1145\/2994374.2994393"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1145\/1741866.1741892"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1145\/2837126.2837157"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1145\/2590296.2590337"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/TMC.2018.2839604"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1145\/2906388.2906404"},{"key":"ref4","first-page":"213","article-title":"It&#x2019;s a hard lock life: A field study of smartphone (un)locking behavior and risk perception","author":"harbach","year":"2014","journal-title":"Symposium on usable Privacy and Security (SOUPS) 2014"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1145\/2858036.2858273"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/SocialCom-PASSAT.2012.60"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2019.101652"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1007\/s00779-016-0905-0"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1145\/3351243"},{"key":"ref2","first-page":"750","article-title":"Are you ready to lock? Understanding user motivations for smartphone locking behaviors","author":"egelman","year":"2014","journal-title":"21st ACM Conference on Computer and Communications Security (CCS 2014)"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1016\/j.pmcj.2013.07.014"},{"key":"ref1","first-page":"49","article-title":"...better to use a lock screen than to worry about saving a few seconds of time&#x201D;: Effect of fear appeal in the context of smartphone locking behavior","author":"albayram","year":"2017","journal-title":"13th Symposium on Usable Privacy and Security (SOUPS 2017)"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1145\/3365921.3365923"},{"key":"ref21","first-page":"7","article-title":"Towards rich mobile phone datasets: Lausanne data collection campaign","volume":"68","author":"kiukkonen","year":"2010","journal-title":"Proc ICPS"}],"event":{"name":"2021 18th International Conference on Privacy, Security and Trust (PST)","start":{"date-parts":[[2021,12,13]]},"location":"Auckland, New Zealand","end":{"date-parts":[[2021,12,15]]}},"container-title":["2021 18th International Conference on Privacy, Security and Trust (PST)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/9647713\/9647738\/09647739.pdf?arnumber=9647739","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,5,10]],"date-time":"2022-05-10T16:59:51Z","timestamp":1652201991000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9647739\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,12,13]]},"references-count":21,"URL":"https:\/\/doi.org\/10.1109\/pst52912.2021.9647739","relation":{},"subject":[],"published":{"date-parts":[[2021,12,13]]}}}