{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,8]],"date-time":"2024-09-08T08:53:56Z","timestamp":1725785636924},"reference-count":16,"publisher":"IEEE","license":[{"start":{"date-parts":[[2020,1,1]],"date-time":"2020-01-01T00:00:00Z","timestamp":1577836800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2020,1,1]],"date-time":"2020-01-01T00:00:00Z","timestamp":1577836800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2020,1,1]],"date-time":"2020-01-01T00:00:00Z","timestamp":1577836800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2020,1]]},"DOI":"10.1109\/sii46433.2020.9026294","type":"proceedings-article","created":{"date-parts":[[2020,3,10]],"date-time":"2020-03-10T02:14:57Z","timestamp":1583806497000},"page":"300-304","source":"Crossref","is-referenced-by-count":3,"title":["Dynamic Hand Gesture Authentication using Electromyography (EMG)"],"prefix":"10.1109","author":[{"given":"Alex Ming Hui","family":"Wong","sequence":"first","affiliation":[]},{"given":"Masahiro","family":"Furukawa","sequence":"additional","affiliation":[]},{"given":"Hideyuki","family":"Ando","sequence":"additional","affiliation":[]},{"given":"Taro","family":"Maeda","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1155\/2015\/935986"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1155\/2018\/2567463"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1016\/B978-0-12-817444-9.00002-7"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1186\/s12984-017-0290-6"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/NEBEC.2013.87"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.3389\/fnbot.2019.00048"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1002\/1099-1115(200012)14:8<829::AID-ACS623>3.0.CO;2-L"},{"journal-title":"Static vs behavioural whats the future of biometric authentication?","year":"2019","key":"ref4"},{"journal-title":"Behavioral Biometrics Dynamic Approach to Authentication and Security","year":"2019","key":"ref3"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1145\/3052973.3053032"},{"journal-title":"About Touch ID advanced security technology","year":"2019","key":"ref5"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1155\/2016\/7427980"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1016\/j.jisa.2017.10.002"},{"journal-title":"Behavioral Biometrics 101 Static Biometrics vs Behavioral Biometrics","year":"2019","key":"ref2"},{"key":"ref1","article-title":"Biometrics: a guide","author":"besley","year":"2018","journal-title":"The Government Office for Science"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1007\/s10207-012-0154-9"}],"event":{"name":"2020 IEEE\/SICE International Symposium on System Integration (SII)","start":{"date-parts":[[2020,1,12]]},"location":"Honolulu, HI, USA","end":{"date-parts":[[2020,1,15]]}},"container-title":["2020 IEEE\/SICE International Symposium on System Integration (SII)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/9011449\/9025808\/09026294.pdf?arnumber=9026294","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,6,30]],"date-time":"2022-06-30T11:18:28Z","timestamp":1656587908000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9026294\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,1]]},"references-count":16,"URL":"https:\/\/doi.org\/10.1109\/sii46433.2020.9026294","relation":{},"subject":[],"published":{"date-parts":[[2020,1]]}}}