{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,2,21]],"date-time":"2025-02-21T11:13:00Z","timestamp":1740136380383,"version":"3.37.3"},"reference-count":60,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"2","license":[{"start":{"date-parts":[[2025,2,1]],"date-time":"2025-02-01T00:00:00Z","timestamp":1738368000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2025,2,1]],"date-time":"2025-02-01T00:00:00Z","timestamp":1738368000000},"content-version":"am","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2025,2,1]],"date-time":"2025-02-01T00:00:00Z","timestamp":1738368000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2025,2,1]],"date-time":"2025-02-01T00:00:00Z","timestamp":1738368000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"name":"LABoR","award":["LEQSF(2020-23)-RD-A-11"],"award-info":[{"award-number":["LEQSF(2020-23)-RD-A-11"]}]},{"name":"NSF","award":["CNS-2155131"],"award-info":[{"award-number":["CNS-2155131"]}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Trans. on Mobile Comput."],"published-print":{"date-parts":[[2025,2]]},"DOI":"10.1109\/tmc.2024.3474673","type":"journal-article","created":{"date-parts":[[2024,10,4]],"date-time":"2024-10-04T17:40:14Z","timestamp":1728063614000},"page":"1230-1248","source":"Crossref","is-referenced-by-count":0,"title":["Biometric Encoding for Replay-Resistant Smartphone User Authentication Using Handgrips"],"prefix":"10.1109","volume":"24","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-7192-1024","authenticated-orcid":false,"given":"Long","family":"Huang","sequence":"first","affiliation":[{"name":"Department of Computer Science, Louisiana State University, Baton Rouge, LA, USA"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-9737-1673","authenticated-orcid":false,"given":"Chen","family":"Wang","sequence":"additional","affiliation":[{"name":"Department of Computer Science, Southern Methodist University, Dallas, TX, USA"}]}],"member":"263","reference":[{"year":"2017","key":"ref1","article-title":"EyeVerify survey\n      reveals high consumer trust in biometrics for mobile banking and\n     payments"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2016.2620278"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2014.2322255"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2015.2398819"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2015.2398817"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/ICB.2013.6613027"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.7763\/IJMLC.2014.V4.413"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/MC.2014.118"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/APSIPA.2014.7041636"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.21437\/Interspeech.2017-450"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1145\/3359789.3359838"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1145\/2976749.2978311"},{"issue":"2","key":"ref13","article-title":"Handgrip\n      recognition","volume":"1","author":"Chen","year":"2007","journal-title":"J. Eng. Comput. Archit."},{"article-title":"Personalization\n      using a hand-pressure signature","year":"2012","author":"Migos","key":"ref14"},{"article-title":"Grip\n      signature authentication of user of device","year":"2015","author":"Weksler","key":"ref15"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/SAHCN.2017.7964907"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1145\/3319535.3354242"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1145\/3359789.3359830"},{"year":"2020","key":"ref19","article-title":"Code of federal regulations\n      title 47: Part 18 industrial, scientific and medical equipment"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1121\/1.2761883"},{"key":"ref21","first-page":"321","article-title":"EchoPrint:\n      Two-factor authentication using acoustics and vision on smartphones","volume-title":"Proc. 24th Annu. Int. Conf. Mobile Comput. Netw.","author":"Zhou"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1145\/3241539.3241574"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1145\/3241539.3241568"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1145\/2906388.2906394"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.17487\/rfc3447"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-662-45472-5_11"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1145\/357353.357357"},{"year":"2019","key":"ref28","article-title":"Use touch ID on iPhone and\n      iPad"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1145\/3308558.3313591"},{"year":"2021","key":"ref30","article-title":"Flexible bendable mannequin hands for nails practice fake hand nail\n      display tool"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2017.2788000"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1016\/j.ins.2016.06.046"},{"article-title":"Ultrasound\n      detector","year":"2018","author":"Gudkov","key":"ref33"},{"article-title":"Audioldm: Text-to-audio generation with latent diffusion\n      models","year":"2023","author":"Liu","key":"ref34"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1109\/ICASSP49357.2023.10095889"},{"article-title":"Attention is all you need","volume-title":"Proc. Adv. Neural Inf. Process. Syst.","author":"Vaswani","key":"ref36"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1609\/aaai.v35i12.17325"},{"article-title":"An image is worth 16x16 words: Transformers for image\n      recognition at scale","year":"2020","author":"Dosovitskiy","key":"ref38"},{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.1016\/j.patcog.2023.109798"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.1109\/FG57933.2023.10042710"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.1145\/3447548.3467401"},{"key":"ref42","doi-asserted-by":"publisher","DOI":"10.1145\/3133956.3133964"},{"key":"ref43","doi-asserted-by":"publisher","DOI":"10.1109\/TMC.2014.2365185"},{"key":"ref44","doi-asserted-by":"publisher","DOI":"10.1109\/89.365379"},{"key":"ref45","doi-asserted-by":"publisher","DOI":"10.1109\/ICNP.2014.43"},{"key":"ref46","doi-asserted-by":"publisher","DOI":"10.1145\/2207676.2208543"},{"key":"ref47","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2006.879289"},{"key":"ref48","doi-asserted-by":"publisher","DOI":"10.1145\/2508859.2516659"},{"key":"ref49","doi-asserted-by":"publisher","DOI":"10.1109\/TCE.2010.5681156"},{"key":"ref50","doi-asserted-by":"publisher","DOI":"10.1109\/ICMEW.2012.116"},{"key":"ref51","doi-asserted-by":"publisher","DOI":"10.1109\/ICB.2015.7139044"},{"key":"ref52","doi-asserted-by":"publisher","DOI":"10.1016\/j.imavis.2013.12.014"},{"key":"ref53","doi-asserted-by":"publisher","DOI":"10.1109\/PRISMS.2013.6927175"},{"key":"ref54","doi-asserted-by":"publisher","DOI":"10.3390\/cryptography2010001"},{"key":"ref55","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-08509-8_6"},{"key":"ref56","doi-asserted-by":"publisher","DOI":"10.1145\/2207676.2208544"},{"key":"ref57","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2014.2316472"},{"key":"ref58","doi-asserted-by":"publisher","DOI":"10.1109\/CNS.2015.7346804"},{"article-title":"Authentication\n      system based on periodic challenge\/response protocol","year":"2000","author":"Davis","key":"ref59"},{"key":"ref60","doi-asserted-by":"publisher","DOI":"10.1109\/SP46214.2022.9833564"}],"container-title":["IEEE Transactions on Mobile Computing"],"original-title":[],"link":[{"URL":"https:\/\/ieeexplore.ieee.org\/ielam\/7755\/10836120\/10705898-aam.pdf","content-type":"application\/pdf","content-version":"am","intended-application":"syndication"},{"URL":"http:\/\/xplorestaging.ieee.org\/ielx8\/7755\/10836120\/10705898.pdf?arnumber=10705898","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,1,10]],"date-time":"2025-01-10T05:43:28Z","timestamp":1736487808000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10705898\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,2]]},"references-count":60,"journal-issue":{"issue":"2"},"URL":"https:\/\/doi.org\/10.1109\/tmc.2024.3474673","relation":{},"ISSN":["1536-1233","1558-0660","2161-9875"],"issn-type":[{"type":"print","value":"1536-1233"},{"type":"electronic","value":"1558-0660"},{"type":"electronic","value":"2161-9875"}],"subject":[],"published":{"date-parts":[[2025,2]]}}}