{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T04:17:34Z","timestamp":1750306654669,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":13,"publisher":"ACM","license":[{"start":{"date-parts":[[2014,9,23]],"date-time":"2014-09-23T00:00:00Z","timestamp":1411430400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"DOI":"10.13039\/501100004963","name":"Seventh Framework Programme","doi-asserted-by":"publisher","award":["600707"],"award-info":[{"award-number":["600707"]}],"id":[{"id":"10.13039\/501100004963","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100003329","name":"Ministerio de Econom\u00eda y Competitividad","doi-asserted-by":"publisher","award":["TIN2010-20488"],"award-info":[{"award-number":["TIN2010-20488"]}],"id":[{"id":"10.13039\/501100003329","id-type":"DOI","asserted-by":"publisher"}]},{"name":"GVA, VALi+d program","award":["APOSTD\/2013\/013"],"award-info":[{"award-number":["APOSTD\/2013\/013"]}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2014,9,23]]},"DOI":"10.1145\/2628363.2628372","type":"proceedings-article","created":{"date-parts":[[2014,9,23]],"date-time":"2014-09-23T15:05:54Z","timestamp":1411484754000},"page":"63-66","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":12,"title":["BoD taps"],"prefix":"10.1145","author":[{"given":"Luis A.","family":"Leiva","sequence":"first","affiliation":[{"name":"Universitat Polit\u00e8cnica de Val\u00e8ncia, Valencia, Spain"}]},{"given":"Alejandro","family":"Catal\u00e0","sequence":"additional","affiliation":[{"name":"Universitat Polit\u00e8cnica de Val\u00e8ncia, Valencia, Spain"}]}],"member":"320","published-online":{"date-parts":[[2014,9,23]]},"reference":[{"key":"e_1_3_2_1_1_1","volume-title":"Proc. USENIX WOOT","author":"Aviv A. J.","year":"2010","unstructured":"Aviv , A. J. , Gibson , K. , Mossop , E. , Blaze , M. , and Smith , J. M . Smudge attacks on smartphone touch screens . In Proc. USENIX WOOT ( 2010 ), 1--7. Aviv, A. J., Gibson, K., Mossop, E., Blaze, M., and Smith, J. M. Smudge attacks on smartphone touch screens. In Proc. USENIX WOOT (2010), 1--7."},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1145\/2384916.2384945"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1145\/1935701.1935740"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.5555\/2033326.2033338"},{"key":"e_1_3_2_1_5_1","first-page":"63","volume":"80","author":"Burr W. E.","unstructured":"Burr , W. E. , Dodson , D. F. , Newton , E. M. , Perlner , R. A. , Polk , W. T. , Gupta , S. , and Nabbus , E. A. Electronic authentication guideline. NIST Special Publication 80 0- 63 - 61 , 2011. Burr, W. E., Dodson, D. F., Newton, E. M., Perlner, R. A., Polk, W. T., Gupta, S., and Nabbus, E. A. Electronic authentication guideline. NIST Special Publication 800-63-1, 2011.","journal-title":"NIST Special Publication"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10207-006-0006-6"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1145\/1518701.1518840"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1145\/2470654.2481330"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1145\/765891.766081"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1145\/1029632.1029658"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-45233-1_26"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1145\/1143120.1143128"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1145\/1463160.1463202"}],"event":{"name":"MobileHCI '14: 16th International Conference on Human-Computer Interaction with Mobile Devices and Services","sponsor":["SIGCHI ACM Special Interest Group on Computer-Human Interaction"],"location":"Toronto ON Canada","acronym":"MobileHCI '14"},"container-title":["Proceedings of the 16th international conference on Human-computer interaction with mobile devices &amp; services"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2628363.2628372","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/2628363.2628372","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T06:56:14Z","timestamp":1750229774000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2628363.2628372"}},"subtitle":["an improved back-of-device authentication technique on smartphones"],"short-title":[],"issued":{"date-parts":[[2014,9,23]]},"references-count":13,"alternative-id":["10.1145\/2628363.2628372","10.1145\/2628363"],"URL":"https:\/\/doi.org\/10.1145\/2628363.2628372","relation":{},"subject":[],"published":{"date-parts":[[2014,9,23]]},"assertion":[{"value":"2014-09-23","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}