{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,23]],"date-time":"2026-01-23T12:35:16Z","timestamp":1769171716785,"version":"3.49.0"},"reference-count":72,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"3","license":[{"start":{"date-parts":[[2020,3,1]],"date-time":"2020-03-01T00:00:00Z","timestamp":1583020800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2020,3,1]],"date-time":"2020-03-01T00:00:00Z","timestamp":1583020800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2020,3,1]],"date-time":"2020-03-01T00:00:00Z","timestamp":1583020800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Trans. on Mobile Comput."],"published-print":{"date-parts":[[2020,3,1]]},"DOI":"10.1109\/tmc.2019.2897933","type":"journal-article","created":{"date-parts":[[2019,2,7]],"date-time":"2019-02-07T20:37:03Z","timestamp":1549571823000},"page":"697-710","source":"Crossref","is-referenced-by-count":28,"title":["Security Properties of Gait for Mobile Device Pairing"],"prefix":"10.1109","volume":"19","author":[{"given":"Arne","family":"Brusch","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0001-7765-1483","authenticated-orcid":false,"given":"Ngu","family":"Nguyen","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-6840-5683","authenticated-orcid":false,"given":"Dominik","family":"Schurmann","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0001-6118-3355","authenticated-orcid":false,"given":"Stephan","family":"Sigg","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0001-9782-7765","authenticated-orcid":false,"given":"Lars","family":"Wolf","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref72","doi-asserted-by":"publisher","DOI":"10.2307\/1412159"},{"key":"ref71","doi-asserted-by":"publisher","DOI":"10.1145\/3072959.3073596"},{"key":"ref70","doi-asserted-by":"publisher","DOI":"10.1109\/TMC.2017.2686855"},{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.1109\/10.880106"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-72037-9_15"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1109\/ICIEA.2007.4318894"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1109\/ICBBE.2007.142"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1117\/12.603331"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1109\/ROBOT.2007.364224"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1109\/IPSN.2016.7460727"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1145\/2971648.2971670"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-44887-X_82"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1007\/11748625_12"},{"key":"ref60","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-24646-6_3"},{"key":"ref62","doi-asserted-by":"publisher","DOI":"10.1145\/2684103.2684122"},{"key":"ref61","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-21726-5_21"},{"key":"ref63","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-73275-4_1"},{"key":"ref28","article-title":"Performance and security analysis of gait-based user authentication","author":"gafurov","year":"2008"},{"key":"ref64","doi-asserted-by":"publisher","DOI":"10.1109\/PERCOM.2016.7456521"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-45344-X_44"},{"key":"ref65","doi-asserted-by":"publisher","DOI":"10.4108\/icst.mobiquitous.2014.257920"},{"key":"ref66","doi-asserted-by":"publisher","DOI":"10.1007\/s10207-015-0273-1"},{"key":"ref29","article-title":"A shoe-integrated sensor system for wireless gait analysis and real-time therapeutic feedback","author":"morris","year":"2004"},{"key":"ref67","first-page":"38","article-title":"Tests concerning random points on a circle","volume":"63","author":"kuiper","year":"1962","journal-title":"Proc Koinklijke Nederlandse Akademie van Wetenschappen"},{"key":"ref68","author":"bolle","year":"2013","journal-title":"Guide to Biometrics"},{"key":"ref69","doi-asserted-by":"publisher","DOI":"10.1145\/2994551.2994556"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/MWC.2016.1500284WC"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1016\/j.jnca.2012.12.028"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/TPAMI.2005.39"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.3758\/BF03337021"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/MSP.2005.1550191"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1016\/j.cviu.2004.04.004"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1109\/MNRAO.1994.346253"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1109\/TPAMI.2005.246"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1109\/AFGR.2004.1301521"},{"key":"ref50","article-title":"Smartphones and biometrics: Gait and activity recognition","author":"derawi","year":"2012"},{"key":"ref51","first-page":"19","article-title":"A survey of biometric gait recognition: Approaches, security and challenges","author":"gafurov","year":"2007","journal-title":"Proc Norwegian Conf Comput Sci"},{"key":"ref59","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-39863-9_19"},{"key":"ref58","doi-asserted-by":"publisher","DOI":"10.1145\/2699343.2699367"},{"key":"ref57","doi-asserted-by":"crossref","first-page":"94","DOI":"10.1176\/ajp.139.1.94","article-title":"Gait patterns of depressed patients and normal subjects","volume":"139","author":"sloman","year":"1982","journal-title":"Amer J Psychiatry"},{"key":"ref56","doi-asserted-by":"publisher","DOI":"10.1145\/2536853.2536895"},{"key":"ref55","article-title":"Gait analysis: Is it easy to learn to walk like someone else?","author":"stang","year":"2007"},{"key":"ref54","first-page":"361","article-title":"Walk the walk: Attacking gait biometrics by imitation","author":"mjaaland","year":"2010","journal-title":"Int Conf Inform Science and Security"},{"key":"ref53","doi-asserted-by":"publisher","DOI":"10.1109\/BTAS.2015.7358801"},{"key":"ref52","author":"jain","year":"2007","journal-title":"Handbook of Biometrics"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/PERCOM.2017.7917865"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1016\/j.pmcj.2018.03.006"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.1145\/633292.633453"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/BSN.2017.7936042"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1145\/2428955.2428989"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/IPSN.2016.7460726"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1145\/3023954"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2017.2708690"},{"key":"ref17","first-page":"231","article-title":"Automatic gait recognition","author":"nixon","year":"1996","journal-title":"Biometrics"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/TPAMI.2006.38"},{"key":"ref19","doi-asserted-by":"crossref","first-page":"863","DOI":"10.1109\/TPAMI.2006.122","article-title":"Improved gait recognition by gait dynamics normalization","volume":"28","author":"liu","year":"2006","journal-title":"IEEE Trans Pattern Anal Mach Intell"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/TMC.2016.2582489"},{"key":"ref3","first-page":"314","article-title":"PINtext: A framework for secure communication based on context","author":"sigg","year":"2011","journal-title":"Proc Int Conf Mobile Ubiquitous Syst Comput Netw Services"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2015.2505626"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/TMC.2011.271"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/TMC.2017.2686855"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1145\/1999995.2000016"},{"key":"ref49","doi-asserted-by":"publisher","DOI":"10.1109\/IIHMSP.2010.83"},{"key":"ref9","article-title":"Compensating for on-body placement effects in activity recognition","author":"kunze","year":"2011"},{"key":"ref46","volume":"4","author":"nixon","year":"2010","journal-title":"Human Identification Based on Gait"},{"key":"ref45","doi-asserted-by":"publisher","DOI":"10.1007\/11608288_81"},{"key":"ref48","doi-asserted-by":"publisher","DOI":"10.1007\/s10207-015-0273-1"},{"key":"ref47","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2007.902030"},{"key":"ref42","doi-asserted-by":"publisher","DOI":"10.3758\/BF03212378"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.1109\/AUTOID.2005.2"},{"key":"ref44","doi-asserted-by":"publisher","DOI":"10.1007\/11608288_80"},{"key":"ref43","doi-asserted-by":"publisher","DOI":"10.1109\/TPAMI.2005.39"}],"container-title":["IEEE Transactions on Mobile Computing"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/7755\/8985165\/08636972.pdf?arnumber=8636972","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,4,27]],"date-time":"2022-04-27T16:38:27Z","timestamp":1651077507000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/8636972\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,3,1]]},"references-count":72,"journal-issue":{"issue":"3"},"URL":"https:\/\/doi.org\/10.1109\/tmc.2019.2897933","relation":{},"ISSN":["1536-1233","1558-0660","2161-9875"],"issn-type":[{"value":"1536-1233","type":"print"},{"value":"1558-0660","type":"electronic"},{"value":"2161-9875","type":"electronic"}],"subject":[],"published":{"date-parts":[[2020,3,1]]}}}