{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,7]],"date-time":"2024-09-07T08:18:35Z","timestamp":1725697115033},"reference-count":17,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2018,5]]},"DOI":"10.1109\/siu.2018.8404345","type":"proceedings-article","created":{"date-parts":[[2018,7,9]],"date-time":"2018-07-09T23:00:46Z","timestamp":1531177246000},"page":"1-4","source":"Crossref","is-referenced-by-count":1,"title":["Recognition of biometrie unlock pattern by GMM-UBM"],"prefix":"10.1109","author":[{"given":"M. Erdal","family":"Ozbek","sequence":"first","affiliation":[]},{"given":"Mohamed Amine","family":"Haytom","sequence":"additional","affiliation":[]},{"given":"Estelle","family":"Cherrier","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","first-page":"130","author":"angulo","year":"2012","journal-title":"Exploring Touch-screen Biometrics for User Identification on Smart Phones"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/WCCIT.2013.6618670"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1006\/dspr.1999.0361"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/MSP.2015.2462851"},{"journal-title":"Handbook of Multibiomet-rics","year":"2006","author":"ross","key":"ref14"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2015.04.052"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1155\/S1110865704310024"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1016\/j.specom.2009.08.009"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1007\/s11390-011-1195-7"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1155\/2016\/8762892"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1016\/j.jisa.2014.10.009"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1145\/2333112.2333114"},{"key":"ref8","article-title":"Smudge attacks on smartphone touch screens","author":"aviv","year":"2010","journal-title":"USENIX Workshop on Offensive Technologies (WOOT)"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/CCNC.2016.7444763"},{"key":"ref2","first-page":"213","article-title":"It's a hard lock life: A field study of smartphone (un)locking behavior and risk perception","author":"harbach","year":"2014","journal-title":"Symposium On Usable Privacy and Security (SOUPS)"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2006.873653"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1145\/1133265.1133303"}],"event":{"name":"2018 26th Signal Processing and Communications Applications Conference (SIU)","start":{"date-parts":[[2018,5,2]]},"location":"Izmir","end":{"date-parts":[[2018,5,5]]}},"container-title":["2018 26th Signal Processing and Communications Applications Conference (SIU)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/8394765\/8404147\/08404345.pdf?arnumber=8404345","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,1,26]],"date-time":"2022-01-26T15:19:24Z","timestamp":1643210364000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/8404345\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,5]]},"references-count":17,"URL":"https:\/\/doi.org\/10.1109\/siu.2018.8404345","relation":{},"subject":[],"published":{"date-parts":[[2018,5]]}}}