{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T04:14:40Z","timestamp":1750306480912,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":27,"publisher":"ACM","license":[{"start":{"date-parts":[[2015,12,11]],"date-time":"2015-12-11T00:00:00Z","timestamp":1449792000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2015,12,11]]},"DOI":"10.1145\/2837126.2843845","type":"proceedings-article","created":{"date-parts":[[2016,4,12]],"date-time":"2016-04-12T12:23:12Z","timestamp":1460463792000},"page":"384-388","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":7,"title":["Confidence and Risk Estimation Plugins for Multi-Modal Authentication on Mobile Devices using CORMORANT"],"prefix":"10.1145","author":[{"given":"Daniel","family":"Hintze","sequence":"first","affiliation":[{"name":"FHDW Paderborn, F\u00fcrstenallee 3 - 5, 33102 Paderborn, Germany"}]},{"given":"Muhammad","family":"Muaaz","sequence":"additional","affiliation":[{"name":"UAS Upper Austria, Softwarepark 11, 4232 Hagenberg, Austria"}]},{"given":"Rainhard D.","family":"Findling","sequence":"additional","affiliation":[{"name":"UAS Upper Austria, Softwarepark 11, 4232 Hagenberg, Austria"}]},{"given":"Sebastian","family":"Scholz","sequence":"additional","affiliation":[{"name":"FHDW Paderborn, F\u00fcrstenallee 3 - 5, 33102 Paderborn, Germany"}]},{"given":"Eckhard","family":"Koch","sequence":"additional","affiliation":[{"name":"FHDW Paderborn, F\u00fcrstenallee 3 - 5, 33102 Paderborn, Germany"}]},{"given":"Ren\u00e9","family":"Mayrhofer","sequence":"additional","affiliation":[{"name":"JKU Linz, Altenbergerstra\u00dfe 69, 4040 Linz, Austria"}]}],"member":"320","published-online":{"date-parts":[[2015,12,11]]},"reference":[{"key":"e_1_3_2_1_1_1","unstructured":"International Statistics\n       on \n      Crime\n     and Justice.\n   In S. Harrendorf M. Heiskanen and S. Malby editors European Institute for Crime Prevention and Control\n  . \n  2010\n  .  International Statistics on Crime and Justice. In S. Harrendorf M. Heiskanen and S. Malby editors European Institute for Crime Prevention and Control. 2010."},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.5555\/1925004.1925009"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1109\/CNS.2013.6682761"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1155\/S1110865704310024"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2013.05.005"},{"key":"e_1_3_2_1_7_1","volume-title":"Security and Management","author":"Diep N. N.","year":"2007","unstructured":"N. N. Diep , S. Lee , Y.-K. Lee , and H. Lee . Contextual Risk-Based Access Control . Security and Management , 2007 . N. N. Diep, S. Lee, Y.-K. Lee, and H. Lee. Contextual Risk-Based Access Control. Security and Management, 2007."},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1016\/S0169-2070(03)00093-1"},{"key":"e_1_3_2_1_9_1","volume-title":"Pan shot face unlock: Towards unlocking personal mobile devices using stereo vision and biometric face information from multiple perspectives. Master's thesis","author":"Findling R. D.","year":"2013","unstructured":"R. D. Findling . Pan shot face unlock: Towards unlocking personal mobile devices using stereo vision and biometric face information from multiple perspectives. Master's thesis , University of Applied Sciences Upper Austria , Hagenberg, Austria , Sept. 2013 . R. D. Findling. Pan shot face unlock: Towards unlocking personal mobile devices using stereo vision and biometric face information from multiple perspectives. Master's thesis, University of Applied Sciences Upper Austria, Hagenberg, Austria, Sept. 2013."},{"key":"e_1_3_2_1_10_1","first-page":"213","volume-title":"Symposium on Usable Privacy and Security (SOUPS)","author":"Harbach M.","year":"2014","unstructured":"M. Harbach , E. V. Zezschwitz , A. Fichtner , A. De Luca , and M. Smith . It's a Hard Lock Life: A Field Study of Smartphone (Un) Locking Behavior and Risk Perception . Symposium on Usable Privacy and Security (SOUPS) , pages 213 -- 230 , 2014 . M. Harbach, E. V. Zezschwitz, A. Fichtner, A. De Luca, and M. Smith. It's a Hard Lock Life: A Field Study of Smartphone (Un) Locking Behavior and Risk Perception. Symposium on Usable Privacy and Security (SOUPS), pages 213--230, 2014."},{"key":"e_1_3_2_1_11_1","volume-title":"Knock x Knock: The Design and Evaluation of a Unified Authentication Management System","author":"Hayashi E.","year":"2015","unstructured":"E. Hayashi and J. I. Hong . Knock x Knock: The Design and Evaluation of a Unified Authentication Management System . 2015 . E. Hayashi and J. I. Hong. Knock x Knock: The Design and Evaluation of a Unified Authentication Management System. 2015."},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1145\/2800835.2800906"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1145\/2684103.2684156"},{"issue":"2","key":"e_1_3_2_1_14_1","first-page":"149","article-title":"Authentication Aura - A distributed approach to user authentication","volume":"6","author":"Hocking C. G.","year":"2011","unstructured":"C. G. Hocking , S. M. Furnell , N. L. Clarke , and P. L. Reynolds . Authentication Aura - A distributed approach to user authentication . Journal of Information Assurance and Security , 6 ( 2 ): 149 ---- 156 , 2011 . C. G. Hocking, S. M. Furnell, N. L. Clarke, and P. L. Reynolds. Authentication Aura - A distributed approach to user authentication. Journal of Information Assurance and Security, 6(2):149----156, 2011.","journal-title":"Journal of Information Assurance and Security"},{"key":"e_1_3_2_1_15_1","first-page":"219","volume-title":"Architecture of Context-Risk-Aware Authentication System for Web Environments. ICIEIS'2014","author":"Hurkala A.","year":"2014","unstructured":"A. Hurkala and J. Hurkala . Architecture of Context-Risk-Aware Authentication System for Web Environments. ICIEIS'2014 , pages 219 -- 228 , 2014 . A. Hurkala and J. Hurkala. Architecture of Context-Risk-Aware Authentication System for Web Environments. ICIEIS'2014, pages 219--228, 2014."},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1109\/TCE.2010.5681156"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.specom.2009.08.009"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1109\/BTAS.2010.5634532"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICIP.2002.1038171"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1145\/2684103.2684152"},{"key":"e_1_3_2_1_22_1","volume-title":"Listeners Considered Harmful: The \"Whiteboard\" Pattern","author":"Alliance Gi","year":"2004","unstructured":"OS Gi Alliance . Listeners Considered Harmful: The \"Whiteboard\" Pattern . 2004 . OSGi Alliance. Listeners Considered Harmful: The \"Whiteboard\" Pattern. 2004."},{"key":"e_1_3_2_1_23_1","volume-title":"Multimodal Biometrics: an Overview. Signal Processing, (September):1221--1224","author":"Ross A.","year":"2004","unstructured":"A. Ross and A. K. Jain . Multimodal Biometrics: an Overview. Signal Processing, (September):1221--1224 , 2004 . A. Ross and A. K. Jain. Multimodal Biometrics: an Overview. Signal Processing, (September):1221--1224, 2004."},{"key":"e_1_3_2_1_24_1","volume-title":"An Overview of Multimodal Biometrics. Signal & Image Processing (SIPIJ), 4(1):57--64","author":"Sanjekar P. S.","year":"2013","unstructured":"P. S. Sanjekar and J. B. Patil . An Overview of Multimodal Biometrics. Signal & Image Processing (SIPIJ), 4(1):57--64 , 2013 . P. S. Sanjekar and J. B. Patil. An Overview of Multimodal Biometrics. Signal & Image Processing (SIPIJ), 4(1):57--64, 2013."},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-25867-1_6"},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICDH.2012.59"},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1109\/MPRV.2012.54"},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2001.990517"},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.1109\/MSP.2004.81"}],"event":{"name":"MoMM 2015: The 13th International Conference on Advances in Mobile Computing and Multimedia","sponsor":["Johannes Kepler University, Linz, Austria","@WAS International Organization of Information Integration and Web-based Applications and Services"],"location":"Brussels Belgium","acronym":"MoMM 2015"},"container-title":["Proceedings of the 13th International Conference on Advances in Mobile Computing and Multimedia"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2837126.2843845","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/2837126.2843845","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T05:48:21Z","timestamp":1750225701000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2837126.2843845"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015,12,11]]},"references-count":27,"alternative-id":["10.1145\/2837126.2843845","10.1145\/2837126"],"URL":"https:\/\/doi.org\/10.1145\/2837126.2843845","relation":{},"subject":[],"published":{"date-parts":[[2015,12,11]]},"assertion":[{"value":"2015-12-11","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}