{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,7,4]],"date-time":"2025-07-04T05:33:39Z","timestamp":1751607219502,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":17,"publisher":"ACM","license":[{"start":{"date-parts":[[2008,4,5]],"date-time":"2008-04-05T00:00:00Z","timestamp":1207353600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2008,4,5]]},"DOI":"10.1145\/1358628.1358699","type":"proceedings-article","created":{"date-parts":[[2008,4,8]],"date-time":"2008-04-08T16:27:59Z","timestamp":1207672079000},"page":"2423-2432","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":20,"title":["Biometric daemons"],"prefix":"10.1145","author":[{"given":"Pamela","family":"Briggs","sequence":"first","affiliation":[{"name":"Northumbria University, Newcastle upon Tyne, United Kingdom"}]},{"given":"Patrick L.","family":"Olivier","sequence":"additional","affiliation":[{"name":"Newcastle University, Newcastle upon Tyne, United Kingdom"}]}],"member":"320","published-online":{"date-parts":[[2008,4,5]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1145\/322796.322806"},{"key":"e_1_3_2_1_2_1","first-page":"175","volume-title":"Designing Secure Systems that People Can Use. O'Reilly","author":"Coventry L.","year":"2005","unstructured":"Coventry , L. ( 2005 ). Usable Biometrics . In L. Cranor and S. Garfinkel (Eds.) Designing Secure Systems that People Can Use. O'Reilly , pp. 175 -- 198 . Coventry, L. (2005). Usable Biometrics. In L. Cranor and S. Garfinkel (Eds.) Designing Secure Systems that People Can Use. O'Reilly, pp. 175--198."},{"key":"e_1_3_2_1_3_1","volume-title":"Preface to L","author":"Cranor L.","year":"2005","unstructured":"Cranor , L. and Garfinkel , S . ( 2005 ) Preface to L . Cranor and S. Garfinkel (Eds.) Designing Secure Systems that People Can Use. O'Reilly . Cranor, L. and Garfinkel, S. (2005) Preface to L. Cranor and S. Garfinkel (Eds.) Designing Secure Systems that People Can Use. O'Reilly."},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1016\/S1077-3142(03)00008-0"},{"key":"e_1_3_2_1_5_1","first-page":"2","article-title":"Banking on security and control? UK companies face overhaul of controls","volume":"8","author":"Hinde S.","year":"2004","unstructured":"Hinde , S. ( 2004 ). Banking on security and control? UK companies face overhaul of controls . Computer Fraud and Security , 8 , 2 -- 4 . Hinde, S. (2004). Banking on security and control? UK companies face overhaul of controls. Computer Fraud and Security, 8, 2--4.","journal-title":"Computer Fraud and Security"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1145\/328236.328146"},{"key":"e_1_3_2_1_7_1","volume-title":"Trust in e-services: technologies, practices and challenges. USA","author":"Little L.","year":"2006","unstructured":"Little , L. , Marsh , S. , &amp; Briggs , P. ( 2006 ). Trust and privacy permissions for an ambient world . In R. Song, L. Korba, G. Yee (Eds.) Trust in e-services: technologies, practices and challenges. USA : Ideas Group , Chapter 11 Little, L., Marsh, S., &amp; Briggs, P. (2006). Trust and privacy permissions for an ambient world. In R. Song, L. Korba, G. Yee (Eds.) Trust in e-services: technologies, practices and challenges. USA: Ideas Group, Chapter 11"},{"key":"e_1_3_2_1_8_1","volume-title":"Proceedings of the First International Conference on Biometric Authentication, ICBA 2004, Springer-Verlag Heidelberg, International Conference on Biometric Authentication, 694--700","author":"Livia C. F.","year":"2004","unstructured":"Livia C. F. Araujo , Luiz H. R. Sucupira Jr ., Miguel G. Lizarraga , Lee L. Ling , Joao B. T. Yabu -uti ( 2004 ). User Authentication through Typing Biometrics Features . Proceedings of the First International Conference on Biometric Authentication, ICBA 2004, Springer-Verlag Heidelberg, International Conference on Biometric Authentication, 694--700 . Livia C. F. Araujo, Luiz H. R. Sucupira Jr., Miguel G. Lizarraga, Lee L. Ling, Joao B. T. Yabu-uti (2004). User Authentication through Typing Biometrics Features. Proceedings of the First International Conference on Biometric Authentication, ICBA 2004, Springer-Verlag Heidelberg, International Conference on Biometric Authentication, 694--700."},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICASSP.2005.1415569"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1145\/348941.348995"},{"key":"e_1_3_2_1_11_1","first-page":"449","volume-title":"Proceedings of the 6th International Conference on Recent Advances in Soft Computing (RASC","author":"Modi S. K.","year":"2006","unstructured":"Modi , S. K. and Elliott , S. J . ( 2006 ). Impact of Image Quality on Performance: Comparison of Young and Elderly Fingerprints . Proceedings of the 6th International Conference on Recent Advances in Soft Computing (RASC 2006), K. Sirlantzis (Ed.) , pp. 449 -- 445 Modi, S. K. and Elliott, S. J. (2006). Impact of Image Quality on Performance: Comparison of Young and Elderly Fingerprints. Proceedings of the 6th International Conference on Recent Advances in Soft Computing (RASC 2006), K. Sirlantzis (Ed.), pp. 449--45"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1145\/266420.266434"},{"key":"e_1_3_2_1_13_1","volume-title":"Northern Lights. Scholastic","author":"Pullman P.","year":"1995","unstructured":"Pullman , P. ( 1995 ) Northern Lights. Scholastic . Pullman, P. (1995) Northern Lights. Scholastic."},{"key":"e_1_3_2_1_14_1","first-page":"103","volume-title":"Security and Usability. In L. Cranor and S. Garfinkel (Eds.) Designing Secure Systems that People Can Use. O'Reilly","author":"Renaud K. V.","year":"2005","unstructured":"Renaud , K. V. ( 2005 ). Evaluating Authentication Mechanisms . in Security and Usability. In L. Cranor and S. Garfinkel (Eds.) Designing Secure Systems that People Can Use. O'Reilly , pp. 103 -- 128 . Renaud, K. V. (2005). Evaluating Authentication Mechanisms. in Security and Usability. In L. Cranor and S. Garfinkel (Eds.) Designing Secure Systems that People Can Use. O'Reilly, pp. 103--128."},{"key":"e_1_3_2_1_15_1","unstructured":"UK families put on Fraud Alert. BBC news available: http:\/\/news.bbc.co.uk\/1\/hi\/uk_politics\/7103566.stm  UK families put on Fraud Alert. BBC news available: http:\/\/news.bbc.co.uk\/1\/hi\/uk_politics\/7103566.stm"},{"key":"e_1_3_2_1_16_1","unstructured":"Yan J. Blackwell A. Anderson R. and Grant A. (2005). The memorability and security of passwords. in Security and Usability. In L. Cranor and S. Garfinkel (Eds.) Designing Secure Systems that People Can Use. O'Reilly pp. 129--142.  Yan J. Blackwell A. Anderson R. and Grant A. (2005). The memorability and security of passwords. in Security and Usability. In L. Cranor and S. Garfinkel (Eds.) Designing Secure Systems that People Can Use. O'Reilly pp. 129--142."},{"key":"e_1_3_2_1_17_1","volume-title":"9--18","author":"Proc","year":"2001","unstructured":"Proc . Hypertext 2001, ACM Press ( 2001 ), 9--18 . Proc. Hypertext 2001, ACM Press (2001), 9--18."}],"event":{"name":"CHI '08: CHI Conference on Human Factors in Computing Systems","sponsor":["ACM Association for Computing Machinery","SIGCHI ACM Special Interest Group on Computer-Human Interaction"],"location":"Florence Italy","acronym":"CHI '08"},"container-title":["CHI '08 Extended Abstracts on Human Factors in Computing Systems"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1358628.1358699","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/1358628.1358699","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T13:56:05Z","timestamp":1750254965000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1358628.1358699"}},"subtitle":["authentication via electronic pets"],"short-title":[],"issued":{"date-parts":[[2008,4,5]]},"references-count":17,"alternative-id":["10.1145\/1358628.1358699","10.1145\/1358628"],"URL":"https:\/\/doi.org\/10.1145\/1358628.1358699","relation":{},"subject":[],"published":{"date-parts":[[2008,4,5]]},"assertion":[{"value":"2008-04-05","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}