{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,18]],"date-time":"2026-03-18T14:11:55Z","timestamp":1773843115091,"version":"3.50.1"},"reference-count":31,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2013,11]]},"DOI":"10.1109\/wifs.2013.6707790","type":"proceedings-article","created":{"date-parts":[[2014,1,10]],"date-time":"2014-01-10T15:09:25Z","timestamp":1389366565000},"page":"31-36","source":"Crossref","is-referenced-by-count":34,"title":["ECG biometric recognition: Permanence analysis of QRS signals for 24 hours continuous authentication"],"prefix":"10.1109","author":[{"given":"Ruggero Donida","family":"Labati","sequence":"first","affiliation":[]},{"given":"Roberto","family":"Sassi","sequence":"additional","affiliation":[]},{"given":"Fabio","family":"Scotti","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"19","doi-asserted-by":"publisher","DOI":"10.1145\/1647314.1647378"},{"key":"17","doi-asserted-by":"publisher","DOI":"10.1109\/TIC-STH.2009.5444466"},{"key":"18","doi-asserted-by":"publisher","DOI":"10.1109\/CCECE.2011.6030676"},{"key":"15","first-page":"1159","article-title":"QRS-complex of ECG-based biometrics in a two-level classifier","author":"hou","year":"2011","journal-title":"Proc of the 2011 IEEE Region 10 Conf- (TENCON)"},{"key":"16","doi-asserted-by":"publisher","DOI":"10.1109\/IEMBS.2011.6090752"},{"key":"13","doi-asserted-by":"publisher","DOI":"10.1109\/ISSNIP.2008.4762003"},{"key":"14","first-page":"97","article-title":"ECG biometric recognition in different physiological conditions using robust normalized QRS complexes","author":"sidek","year":"2012","journal-title":"Computing in Cardiology (CINC)"},{"key":"11","doi-asserted-by":"publisher","DOI":"10.1109\/BTAS.2010.5634478"},{"key":"12","first-page":"285","article-title":"Stability analysis of the 12-lead ECG morphology in different physiological conditions of interest for biometric applications","author":"poree","year":"2009","journal-title":"Computers in Cardiology"},{"key":"21","volume":"7667","author":"niinuma","year":"2010","journal-title":"Continuous User Authentication Using Temporal Information"},{"key":"20","article-title":"Continuous authentication using biometrics: Data, models, and metrics","author":"traore","year":"2011","journal-title":"IGI Global"},{"key":"22","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2010.2075927"},{"key":"23","doi-asserted-by":"publisher","DOI":"10.1109\/TPAMI.2007.1010"},{"key":"24","doi-asserted-by":"publisher","DOI":"10.1007\/s10700-008-9034-1"},{"key":"25","doi-asserted-by":"crossref","first-page":"847","DOI":"10.1007\/978-3-642-01793-3_86","article-title":"Template update methods in adaptive biometric systems: A critical review","volume":"5558","author":"rattani","year":"2009","journal-title":"Advances in Biometrics Ser Lecture Notes in Computer Science"},{"key":"26","article-title":"Biometric system adaptation by self-update and graph-based techniques","author":"rattani","year":"2012","journal-title":"Journal of Visual Languages and Computing"},{"key":"27","doi-asserted-by":"publisher","DOI":"10.1109\/BIOMS.2013.6656145"},{"key":"28","author":"proakis","year":"2007","journal-title":"Digital Signal Processing"},{"key":"29","doi-asserted-by":"publisher","DOI":"10.1109\/TBME.2011.2166263"},{"key":"3","doi-asserted-by":"publisher","DOI":"10.1109\/ITAB.2003.1222403"},{"key":"2","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2007.902922"},{"key":"10","first-page":"1221","author":"ross","year":"2004","journal-title":"Multimodal Biometrics An Overview"},{"key":"1","first-page":"55","article-title":"A survey of EEG based user authentication schemes","author":"khalifa","year":"2012","journal-title":"Proc of the 8th Int Conf on Informatics and Systems (INFOS)"},{"key":"30","article-title":"University of rocher medical center, telemetric and holter ecg warehouse","year":"0","journal-title":"E-hol-03-0202-003"},{"key":"7","doi-asserted-by":"crossref","DOI":"10.1155\/2009\/243215","article-title":"A sequential procedure for individual identity verification using ECG","author":"irvine","year":"2009","journal-title":"EURASIP Journal on Advances in Signal Processing"},{"key":"6","author":"sornmo","year":"2005","journal-title":"Bioelectrical Signal Processing in Cardiac and Neurological Applications"},{"key":"5","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2012.2215324"},{"key":"31","doi-asserted-by":"publisher","DOI":"10.1109\/TIM.2005.851087"},{"key":"4","doi-asserted-by":"publisher","DOI":"10.1109\/APBME.2003.1302621"},{"key":"9","doi-asserted-by":"publisher","DOI":"10.1016\/j.patcog.2004.05.014"},{"key":"8","doi-asserted-by":"publisher","DOI":"10.1109\/WIFS.2010.5711466"}],"event":{"name":"2013 IEEE International Workshop on Information Forensics and Security (WIFS)","location":"Guangzhou, China","start":{"date-parts":[[2013,11,18]]},"end":{"date-parts":[[2013,11,21]]}},"container-title":["2013 IEEE International Workshop on Information Forensics and Security (WIFS)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6693295\/6707777\/06707790.pdf?arnumber=6707790","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,6,22]],"date-time":"2017-06-22T01:51:10Z","timestamp":1498096270000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/6707790\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2013,11]]},"references-count":31,"URL":"https:\/\/doi.org\/10.1109\/wifs.2013.6707790","relation":{},"subject":[],"published":{"date-parts":[[2013,11]]}}}