{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T04:20:07Z","timestamp":1750306807398,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":8,"publisher":"ACM","license":[{"start":{"date-parts":[[2014,1,9]],"date-time":"2014-01-09T00:00:00Z","timestamp":1389225600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2014,1,9]]},"DOI":"10.1145\/2557977.2558035","type":"proceedings-article","created":{"date-parts":[[2014,4,1]],"date-time":"2014-04-01T13:07:05Z","timestamp":1396357625000},"page":"1-6","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":4,"title":["Personal identification by flick input with acceleration sensor"],"prefix":"10.1145","author":[{"given":"Shuhei","family":"Kobata","sequence":"first","affiliation":[{"name":"Tokyo University of Technology, Hachioji City, Tokyo Japan"}]},{"given":"Shin","family":"Tezuka","sequence":"additional","affiliation":[{"name":"Keio University, Yokohama, Kanagawa, Japan"}]},{"given":"Ryuya","family":"Uda","sequence":"additional","affiliation":[{"name":"Tokyo University of Technology, Hachioji City, Tokyo Japan"}]}],"member":"320","published-online":{"date-parts":[[2014,1,9]]},"reference":[{"key":"e_1_3_2_1_1_1","volume-title":"Proceedings of the Computer Security Symposium 2010 (Okayama, Japan, October 19-21, 2010). CSS 2010, IPSJ","author":"Sawamura T.","year":"2010","unstructured":"Sawamura , T. , Narita , M. , Noji , N. , Katoh , T. , Bista , B. B. , Takata , T. 2010 . A Proposal of an Authentication Method Using Multi-Touch Screen . In Proceedings of the Computer Security Symposium 2010 (Okayama, Japan, October 19-21, 2010). CSS 2010, IPSJ , Tokyo, 645--650 (Japanese). Sawamura, T., Narita, M., Noji, N., Katoh, T., Bista, B. B., Takata, T. 2010. A Proposal of an Authentication Method Using Multi-Touch Screen. In Proceedings of the Computer Security Symposium 2010 (Okayama, Japan, October 19-21, 2010). CSS 2010, IPSJ, Tokyo, 645--650 (Japanese)."},{"volume-title":"Proceedings of the Computer Security Symposium 2011 (Niigata, Japan, October 19-21, 2011). CSS 2011, IPSJ","author":"Iseri H.","unstructured":"Iseri , H. , and Okamoto , E . 2011. A study of touch panels biometric based on behavioral characteristics . In Proceedings of the Computer Security Symposium 2011 (Niigata, Japan, October 19-21, 2011). CSS 2011, IPSJ , Tokyo, 84--88 (Japanese). Iseri, H., and Okamoto, E. 2011. A study of touch panels biometric based on behavioral characteristics. In Proceedings of the Computer Security Symposium 2011 (Niigata, Japan, October 19-21, 2011). CSS 2011, IPSJ, Tokyo, 84--88 (Japanese).","key":"e_1_3_2_1_2_1"},{"volume-title":"Proceedings of the 15th IASTED International Conference on Control and Applications (Honolulu, USA, August 26-28, 2013). CA 2013, IASTED, Calgary, 136--142","author":"Kobata S.","unstructured":"Kobata , S. , Terabayashi , Y. , and Uda , R ., 2013. Proposal of Method for Personal Identification with Flick Input . In Proceedings of the 15th IASTED International Conference on Control and Applications (Honolulu, USA, August 26-28, 2013). CA 2013, IASTED, Calgary, 136--142 . Kobata, S., Terabayashi, Y., and Uda, R., 2013. Proposal of Method for Personal Identification with Flick Input. In Proceedings of the 15th IASTED International Conference on Control and Applications (Honolulu, USA, August 26-28, 2013). CA 2013, IASTED, Calgary, 136--142.","key":"e_1_3_2_1_3_1"},{"issue":"5","key":"e_1_3_2_1_4_1","first-page":"728","article-title":"An Evaluation and Improvement of User Authentication System Based on Keystroke Timing Data","volume":"33","author":"Kasukawa M.","year":"1992","unstructured":"Kasukawa , M. , Mori , Y. , Komatsu , K. , Akaike , H. , and Kakuda , H. 1992 . An Evaluation and Improvement of User Authentication System Based on Keystroke Timing Data . IPSJ Journal , Vol. 33 , No. 5 , 728 -- 735 (Japanese). Kasukawa, M., Mori, Y., Komatsu, K., Akaike, H., and Kakuda, H. 1992. An Evaluation and Improvement of User Authentication System Based on Keystroke Timing Data. IPSJ Journal, Vol.33, No.5, 728--735 (Japanese).","journal-title":"IPSJ Journal"},{"issue":"2","key":"e_1_3_2_1_5_1","first-page":"397","article-title":"Improving User Authentication Based on Keystroke Intervals by Using Intentional Keystroke Rhythm","volume":"44","author":"Ogoshi Y.","year":"2003","unstructured":"Ogoshi , Y. , Hinata , A. , Hirose , S. , and Kimura , H. 2003 . Improving User Authentication Based on Keystroke Intervals by Using Intentional Keystroke Rhythm . IPSJ Journal , Vol. 44 , No. 2 , 397 -- 400 (Japanese). Ogoshi, Y., Hinata, A., Hirose, S., and Kimura, H. 2003. Improving User Authentication Based on Keystroke Intervals by Using Intentional Keystroke Rhythm. IPSJ Journal, Vol.44, No.2, 397--400 (Japanese).","journal-title":"IPSJ Journal"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_6_1","DOI":"10.1145\/1102120.1102169"},{"key":"e_1_3_2_1_7_1","volume-title":"Password Management Guideline. Department of Defense (April","author":"Brotzman R. L.","year":"1985","unstructured":"Brotzman , R. L. 1985. Password Management Guideline. Department of Defense (April 1985 ), Computer Security Center , U.S.A. Brotzman, R. L. 1985. Password Management Guideline. Department of Defense (April 1985), Computer Security Center, U.S.A."},{"key":"e_1_3_2_1_8_1","volume-title":"Japan (IPA\/ISEC).","author":"IT Security Center","year":"2008","unstructured":"IT Security Center , Information-technology Promotion Agency , Japan (IPA\/ISEC). 2008 . Reporting Status of Vulnerability-related Information about Software Products and Websites - 3rd Quarter of 2008 (July - September) -. http:\/\/www.ipa.go.jp\/files\/000018119.pdf. IT Security Center, Information-technology Promotion Agency, Japan (IPA\/ISEC). 2008. Reporting Status of Vulnerability-related Information about Software Products and Websites - 3rd Quarter of 2008 (July - September) -. http:\/\/www.ipa.go.jp\/files\/000018119.pdf."}],"event":{"sponsor":["SIGAPP ACM Special Interest Group on Applied Computing","SKKU SUNGKYUNKWAN UNIVERSITY"],"acronym":"ICUIMC '14","name":"ICUIMC '14: The 8th International Conference on Ubiquitous Information Management and Communication","location":"Siem Reap Cambodia"},"container-title":["Proceedings of the 8th International Conference on Ubiquitous Information Management and Communication"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2557977.2558035","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/2557977.2558035","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T07:34:59Z","timestamp":1750232099000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2557977.2558035"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014,1,9]]},"references-count":8,"alternative-id":["10.1145\/2557977.2558035","10.1145\/2557977"],"URL":"https:\/\/doi.org\/10.1145\/2557977.2558035","relation":{},"subject":[],"published":{"date-parts":[[2014,1,9]]},"assertion":[{"value":"2014-01-09","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}