{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,9,28]],"date-time":"2025-09-28T20:46:17Z","timestamp":1759092377847,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":18,"publisher":"ACM","license":[{"start":{"date-parts":[[2014,11,4]],"date-time":"2014-11-04T00:00:00Z","timestamp":1415059200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2014,11,4]]},"DOI":"10.1145\/2675682.2676400","type":"proceedings-article","created":{"date-parts":[[2014,10,28]],"date-time":"2014-10-28T12:42:27Z","timestamp":1414500147000},"page":"1-9","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":4,"title":["A spatial entropy-based approach to improve mobile risk-based authentication"],"prefix":"10.1145","author":[{"given":"Jeffrey","family":"Xiong","sequence":"first","affiliation":[{"name":"Rice Univ, Houston, TX"}]},{"given":"John","family":"Xiong","sequence":"additional","affiliation":[{"name":"Identity Management, 3M, Pasadena, CA"}]},{"given":"Christophe","family":"Claramunt","sequence":"additional","affiliation":[{"name":"Naval Academy Research Institute, Lanv\u00e9oc-Poulmic, France"}]}],"member":"320","published-online":{"date-parts":[[2014,11,4]]},"reference":[{"key":"e_1_3_2_1_1_1","volume-title":"Information Theory And the Digital Age. (Final Paper): mit.edu\/6.933\/www\/Fall2001\/Shannon2.pdf","author":"Aftab","year":"2001","unstructured":"Aftab , Cheung, Kim , Thakkar, & Yeddnapudi . ( 2001 ). Information Theory And the Digital Age. (Final Paper): mit.edu\/6.933\/www\/Fall2001\/Shannon2.pdf Aftab, Cheung, Kim, Thakkar, & Yeddnapudi. (2001). Information Theory And the Digital Age. (Final Paper): mit.edu\/6.933\/www\/Fall2001\/Shannon2.pdf"},{"key":"e_1_3_2_1_2_1","volume-title":"A Decision-Rule Topological Map-Matching Algorithm with Multiple Spatial Data. Global Navigation Satellite Systems: Signal, Theory and Applications","author":"Blazquez C. A.","year":"2012","unstructured":"Blazquez , C. A. ( 2012 ). A Decision-Rule Topological Map-Matching Algorithm with Multiple Spatial Data. Global Navigation Satellite Systems: Signal, Theory and Applications , S. Jin (Ed.), InTech . Blazquez, C. A. (2012). A Decision-Rule Topological Map-Matching Algorithm with Multiple Spatial Data. Global Navigation Satellite Systems: Signal, Theory and Applications, S. Jin (Ed.), InTech."},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.dss.2008.07.008"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-33999-8_28"},{"key":"e_1_3_2_1_5_1","volume-title":"Using a Risk-Based Approach to Address a Changing Threat Landscape {White paper}: https:\/\/store.emc.com","author":"EMC Corporation","year":"2013","unstructured":"EMC Corporation . ( 2013 ). Using a Risk-Based Approach to Address a Changing Threat Landscape {White paper}: https:\/\/store.emc.com EMC Corporation. (2013). Using a Risk-Based Approach to Address a Changing Threat Landscape {White paper}: https:\/\/store.emc.com"},{"issue":"4","key":"e_1_3_2_1_6_1","first-page":"10","article-title":"Emerging Security Technologies for Mobile User Accesses","volume":"2","author":"Jobanputra N.","year":"2009","unstructured":"Jobanputra , N. , Kulkarni , V. , Rao , D. , & Gao , J. ( 2009 ). Emerging Security Technologies for Mobile User Accesses . Electronic Journal for Emerging Tools & Applications , 2 ( 4 ), 10 -- 21 . Jobanputra, N., Kulkarni, V., Rao, D., & Gao, J. (2009). Emerging Security Technologies for Mobile User Accesses. Electronic Journal for Emerging Tools & Applications, 2(4), 10--21.","journal-title":"Electronic Journal for Emerging Tools & Applications"},{"issue":"4","key":"e_1_3_2_1_7_1","first-page":"277","article-title":"Using Geographical Location as an Authentication Factor to Enhance mCommerce on Smart Phones","volume":"6","author":"Kuseler T.","year":"2012","unstructured":"Kuseler , T. & Lami , I. A. ( 2012 ), Using Geographical Location as an Authentication Factor to Enhance mCommerce on Smart Phones , International Journal of Computer Science and Security , 6 ( 4 ), 277 -- 287 . Kuseler, T. & Lami, I. A. (2012), Using Geographical Location as an Authentication Factor to Enhance mCommerce on Smart Phones, International Journal of Computer Science and Security, 6(4), 277--287.","journal-title":"International Journal of Computer Science and Security"},{"key":"e_1_3_2_1_8_1","volume-title":"Probability, Entropy, and Inference. Information Theory, Inference, and Learning Algorithms (pp. 22--46)","author":"MacKay D. J.","year":"2003","unstructured":"MacKay , D. J. ( 2003 ). Probability, Entropy, and Inference. Information Theory, Inference, and Learning Algorithms (pp. 22--46) . Cambridge, UK : Cambridge University Press . MacKay, D. J. (2003). Probability, Entropy, and Inference. Information Theory, Inference, and Learning Algorithms (pp. 22--46). Cambridge, UK: Cambridge University Press."},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1111\/j.1467-8306.2004.09402005.x"},{"issue":"1","key":"e_1_3_2_1_10_1","first-page":"122","article-title":"Complex Passwords: How Far Is Too Far? The Role of Cognitive Load on Employee Productivity","volume":"1","author":"Mujeye S.","year":"2013","unstructured":"Mujeye , S. , & Levy , Y. ( 2013 ). Complex Passwords: How Far Is Too Far? The Role of Cognitive Load on Employee Productivity .. Online Journal of Applied Knowledge Management , 1 ( 1 ), 122 -- 132 . Mujeye, S., & Levy, Y. (2013). Complex Passwords: How Far Is Too Far? The Role of Cognitive Load on Employee Productivity.. Online Journal of Applied Knowledge Management, 1(1), 122--132.","journal-title":"Online Journal of Applied Knowledge Management"},{"key":"e_1_3_2_1_11_1","volume-title":"Security of Smart Phones. (Master's Thesis)","author":"Mulliner C. R.","year":"2006","unstructured":"Mulliner , C. R. ( 2006 ). Security of Smart Phones. (Master's Thesis) , University of California , Sanata Barbara . Mulliner, C. R. (2006). Security of Smart Phones. (Master's Thesis), University of California, Sanata Barbara."},{"issue":"1","key":"e_1_3_2_1_12_1","first-page":"1","article-title":"On Spatial Entropy in Geographical Data","volume":"1","author":"Pastzo V.","year":"2009","unstructured":"Pastzo , V. , Tucek , P. , & Vozenielk , V. ( 2009 ). On Spatial Entropy in Geographical Data . GIS Ostrava , 1 ( 1 ), 1 -- 1 . Pastzo, V., Tucek, P., & Vozenielk, V. (2009). On Spatial Entropy in Geographical Data. GIS Ostrava, 1(1), 1--1.","journal-title":"GIS Ostrava"},{"key":"e_1_3_2_1_13_1","volume-title":"Smartphone Ownership -- 2013 Update","author":"Pew Research Center","year":"2013","unstructured":"Pew Research Center . ( 2013 ). Smartphone Ownership -- 2013 Update . Washington, DC : Aaron Smith . Pew Research Center. (2013). Smartphone Ownership -- 2013 Update. Washington, DC: Aaron Smith."},{"key":"e_1_3_2_1_14_1","unstructured":"Rider M. (2012 September 28). Are passwords getting too complex? - New York Computer Security. Examiner.com.  Rider M. (2012 September 28). Are passwords getting too complex? - New York Computer Security. Examiner.com."},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.jtbi.2003.07.002"},{"key":"e_1_3_2_1_16_1","volume-title":"Password policies are getting too complex: Symantec. IT World Canada Information Technology","author":"Ruffolo R.","year":"2011","unstructured":"Ruffolo , R. ( 2011 ). Password policies are getting too complex: Symantec. IT World Canada Information Technology . Ruffolo, R. (2011). Password policies are getting too complex: Symantec. IT World Canada Information Technology."},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1063\/1.3067010"},{"key":"e_1_3_2_1_18_1","volume-title":"Google security exec: 'Passwords are dead'. Technology News - CNET News","author":"Terdiman D.","year":"2013","unstructured":"Terdiman , D. ( 2013 ). Google security exec: 'Passwords are dead'. Technology News - CNET News . Terdiman, D. (2013). Google security exec: 'Passwords are dead'. Technology News - CNET News."}],"event":{"name":"SIGSPATIAL '14: 22nd SIGSPATIAL International Conference on Advances in Geographic Information Systems","sponsor":["SIGSPATIAL ACM Special Interest Group on Spatial Information","SIGGRAPH ACM Special Interest Group on Computer Graphics and Interactive Techniques"],"location":"Dallas\/Fort Worth Texas","acronym":"SIGSPATIAL '14"},"container-title":["Proceedings of the 1st ACM SIGSPATIAL International Workshop on Privacy in Geographic Information Collection and Analysis"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2675682.2676400","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/2675682.2676400","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T20:14:47Z","timestamp":1750277687000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2675682.2676400"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014,11,4]]},"references-count":18,"alternative-id":["10.1145\/2675682.2676400","10.1145\/2675682"],"URL":"https:\/\/doi.org\/10.1145\/2675682.2676400","relation":{},"subject":[],"published":{"date-parts":[[2014,11,4]]},"assertion":[{"value":"2014-11-04","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}