{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,3]],"date-time":"2026-04-03T15:12:45Z","timestamp":1775229165792,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":43,"publisher":"ACM","license":[{"start":{"date-parts":[[2017,10,30]],"date-time":"2017-10-30T00:00:00Z","timestamp":1509321600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"DOI":"10.13039\/100000001","name":"National Science Foundation","doi-asserted-by":"publisher","award":["CNS-1514436 and CNS-1526524"],"award-info":[{"award-number":["CNS-1514436 and CNS-1526524"]}],"id":[{"id":"10.13039\/100000001","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2017,10,30]]},"DOI":"10.1145\/3133956.3133964","type":"proceedings-article","created":{"date-parts":[[2017,10,27]],"date-time":"2017-10-27T12:48:18Z","timestamp":1509108498000},"page":"73-87","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":81,"title":["VibWrite"],"prefix":"10.1145","author":[{"given":"Jian","family":"Liu","sequence":"first","affiliation":[{"name":"Rutgers University, New Brunswick, NJ, USA"}]},{"given":"Chen","family":"Wang","sequence":"additional","affiliation":[{"name":"Rutgers University, New Brunswick, NJ, USA"}]},{"given":"Yingying","family":"Chen","sequence":"additional","affiliation":[{"name":"Rutgers University, New Brunswick, NJ, USA"}]},{"given":"Nitesh","family":"Saxena","sequence":"additional","affiliation":[{"name":"University of Alabama at Birmingham, Birmingham, AL, USA"}]}],"member":"320","published-online":{"date-parts":[[2017,10,30]]},"reference":[{"key":"e_1_3_2_2_1_1","volume-title":"Fuzzy extractors for minutiae-based fingerprint authentication International Conference on Biometrics","author":"Arakala Arathi","unstructured":"Arathi Arakala, Jason Jeffers, and Kathy J Horadam. 2007. Fuzzy extractors for minutiae-based fingerprint authentication International Conference on Biometrics. Springer, 760--769."},{"key":"e_1_3_2_2_2_1","first-page":"1","volume":"10","author":"Aviv Adam J","year":"2010","unstructured":"Adam J Aviv, Katherine L Gibson, Evan Mossop, Matt Blaze, and Jonathan M Smith 2010. Smudge Attacks on Smartphone Touch Screens. Woot Vol. 10 (2010), 1--7.","journal-title":"Smudge Attacks on Smartphone Touch Screens. Woot"},{"key":"e_1_3_2_2_3_1","doi-asserted-by":"publisher","DOI":"10.1145\/1961189.1961199"},{"key":"e_1_3_2_2_4_1","volume-title":"Graphical password authentication using cued click points. Computer Security--ESORICS","author":"Chiasson Sonia","year":"2007","unstructured":"Sonia Chiasson, Paul C van Oorschot, and Robert Biddle. 2007. Graphical password authentication using cued click points. Computer Security--ESORICS 2007. Springer, 359--374."},{"key":"e_1_3_2_2_5_1","doi-asserted-by":"publisher","DOI":"10.1145\/2601097.2601119"},{"key":"e_1_3_2_2_6_1","doi-asserted-by":"publisher","DOI":"10.1145\/1556262.1556312"},{"key":"e_1_3_2_2_7_1","doi-asserted-by":"crossref","unstructured":"Alexander De Luca Alina Hang Frederik Brudy Christian Lindner and Heinrich Hussmann 2012. Touch me once and i know it's you!: implicit authentication based on touch screen patterns Proceedings of the SIGCHI Conference on Human Factors in Computing Systems. 987--996.","DOI":"10.1145\/2207676.2208544"},{"key":"e_1_3_2_2_8_1","volume-title":"Deja Vu-A User Study: Using Images for Authentication USENIX Security Symposium.","author":"Dhamija Rachna","year":"2000","unstructured":"Rachna Dhamija and Adrian Perrig 2000. Deja Vu-A User Study: Using Images for Authentication USENIX Security Symposium."},{"key":"e_1_3_2_2_9_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.medengphy.2004.02.003"},{"key":"e_1_3_2_2_10_1","doi-asserted-by":"publisher","DOI":"10.1109\/83.753738"},{"key":"e_1_3_2_2_11_1","volume-title":"Pattern classification","author":"Duda Richard O","unstructured":"Richard O Duda, Peter E Hart, and David G Stork. 2012. Pattern classification. John Wiley & Sons."},{"key":"e_1_3_2_2_12_1","doi-asserted-by":"crossref","unstructured":"Alain Forget Sonia Chiasson and Robert Biddle. 2010. Shoulder-surfing resistance with eye-gaze entry in cued-recall graphical passwords Proceedings of the SIGCHI Conference on Human Factors in Computing Systems. 1107--1110.","DOI":"10.1145\/1753326.1753491"},{"key":"e_1_3_2_2_13_1","doi-asserted-by":"publisher","DOI":"10.1145\/2426656.2426673"},{"key":"e_1_3_2_2_14_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.patcog.2009.08.016"},{"key":"e_1_3_2_2_15_1","volume-title":"2015 International Conference on. IEEE, 1--11","author":"Lee Wei-Han","year":"2015","unstructured":"Wei-Han Lee and Ruby B Lee 2015. Multi-sensor authentication to improve smartphone security Information Systems Security and Privacy (ICISSP), 2015 International Conference on. IEEE, 1--11."},{"key":"e_1_3_2_2_16_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10044-005-0022-6"},{"key":"e_1_3_2_2_17_1","volume-title":"On Multiple Password Interference of Touch Screen Patterns and Text Passwords Proceedings of the CHI Conference on Human Factors in Computing Systems. ACM, 4818--4822","author":"Meng Weizhi","year":"2016","unstructured":"Weizhi Meng, Wenjuan Li, Lijun Jiang, and Liying Meng. 2016. On Multiple Password Interference of Touch Screen Patterns and Text Passwords Proceedings of the CHI Conference on Human Factors in Computing Systems. ACM, 4818--4822."},{"key":"e_1_3_2_2_18_1","doi-asserted-by":"publisher","DOI":"10.1145\/359168.359172"},{"key":"e_1_3_2_2_19_1","doi-asserted-by":"publisher","DOI":"10.1109\/LSP.2005.860538"},{"key":"e_1_3_2_2_20_1","volume-title":"Battery-Free Identification Token for Touch Sensing Devices Proceedings of the 14th ACM Conference on Embedded Network Sensor Systems CD-ROM. ACM, 109--122","author":"Nguyen Phuc","year":"2016","unstructured":"Phuc Nguyen, Ufuk Muncuk, Ashwin Ashok, Kaushik R Chowdhury, Marco Gruteser, and Tam Vu. 2016. Battery-Free Identification Token for Touch Sensing Devices Proceedings of the 14th ACM Conference on Embedded Network Sensor Systems CD-ROM. ACM, 109--122."},{"key":"e_1_3_2_2_21_1","first-page":"432","article-title":"Indoor apparatus of intercom system and method for controlling indoor apparatus. (June 22 2006)","volume":"11","author":"Ohshima Tomohiro","year":"2006","unstructured":"Tomohiro Ohshima, Tomohiro Morita, Takeshi Tanaka, and Naotako Yamamoto 2006. Indoor apparatus of intercom system and method for controlling indoor apparatus. (June 22 2006). US Patent App. 11\/472,432.","journal-title":"US Patent App."},{"key":"e_1_3_2_2_22_1","volume-title":"Mooi Choo Chuah, and Jie Yang","author":"Ren Yanzhi","year":"2013","unstructured":"Yanzhi Ren, Yingying Chen, Mooi Choo Chuah, and Jie Yang. 2013. Smartphone based user verification leveraging gait recognition for mobile healthcare systems Proceedings of IEEE SECON."},{"key":"e_1_3_2_2_23_1","doi-asserted-by":"publisher","DOI":"10.1109\/TMC.2014.2365185"},{"key":"e_1_3_2_2_24_1","volume-title":"Mooi Choo Chuah, and Jie Yang","author":"Ren Yanzhi","year":"2015","unstructured":"Yanzhi Ren, Chen Wang, Yingying Chen, Mooi Choo Chuah, and Jie Yang 2015. Critical segment based real-time E-signature for securing mobile transactions Proceedings of IEEE Conference on Communications and Network Security (CNS). 7--15."},{"key":"e_1_3_2_2_25_1","doi-asserted-by":"publisher","DOI":"10.1007\/s12555-009-0102-2"},{"key":"e_1_3_2_2_26_1","first-page":"770","article-title":"Access card for multiple accounts. (June 23 1998)","volume":"5","author":"Rose Manning I","year":"1998","unstructured":"Manning I Rose and Lee W Hoevel 1998. Access card for multiple accounts. (June 23 1998). US Patent 5,770,843.","journal-title":"US Patent"},{"key":"e_1_3_2_2_27_1","volume-title":"Computer Science Dept","author":"Y. Rubner and Stanford University","year":"1999","unstructured":"Y. Rubner and Stanford University. Computer Science Dept 1999. Perceptual metrics for image database navigation. Number 1621 in Report STAN-CS-TR. Stanford University. http:\/\/books.google.com\/books?id=5b1EAQAAIAAJ"},{"key":"e_1_3_2_2_28_1","volume-title":"User-generated free-form gestures for authentication: Security and memorability Proceedings of the 12th annual international conference on Mobile systems, applications, and services. ACM, 176--189","author":"Sherman Michael","unstructured":"Michael Sherman, Gradeigh Clark, Yulong Yang, Shridatt Sugrim, Arttu Modig, Janne Lindqvist, Antti Oulasvirta, and Teemu Roos. 2014. User-generated free-form gestures for authentication: Security and memorability Proceedings of the 12th annual international conference on Mobile systems, applications, and services. ACM, 176--189."},{"key":"e_1_3_2_2_29_1","volume-title":"Tracking multiple targets using binary proximity sensors Proceedings of the 6th international conference on Information processing in sensor networks. ACM, 529--538","author":"Singh Jaspreet","unstructured":"Jaspreet Singh, Upamanyu Madhow, Rajesh Kumar, Subhash Suri, and Richard Cagley 2007. Tracking multiple targets using binary proximity sensors Proceedings of the 6th international conference on Information processing in sensor networks. ACM, 529--538."},{"key":"e_1_3_2_2_30_1","volume-title":"Digital communications","author":"Sklar Bernard","unstructured":"Bernard Sklar. 2001. Digital communications. Vol. Vol. 2. Prentice Hall NJ."},{"key":"e_1_3_2_2_31_1","doi-asserted-by":"publisher","DOI":"10.1145\/1081992.1082018"},{"key":"e_1_3_2_2_32_1","doi-asserted-by":"publisher","DOI":"10.1109\/CSAC.2005.27"},{"key":"e_1_3_2_2_33_1","volume-title":"Indoor localization without infrastructure using the acoustic background spectrum Proceedings of the 9th international conference on Mobile systems, applications, and services (ACM MobiSys)","author":"Tarzia Stephen P.","unstructured":"Stephen P. Tarzia, Peter A. Dinda, Robert P. Dick, and Gokhan Memik 2011. Indoor localization without infrastructure using the acoustic background spectrum Proceedings of the 9th international conference on Mobile systems, applications, and services (ACM MobiSys)."},{"key":"e_1_3_2_2_34_1","volume-title":"Marcel JT Reinders, and EA Hendriks","author":"Holt Gineke A","year":"2007","unstructured":"Gineke A ten Holt, Marcel JT Reinders, and EA Hendriks. 2007. Multi-dimensional dynamic time warping for gesture recognition Thirteenth annual conference of the Advanced School for Computing and Imaging, Vol. Vol. 300."},{"key":"e_1_3_2_2_35_1","unstructured":"Jing Tian Chengzhang Qu Wenyuan Xu and Song Wang. 2013. KinWrite: Handwriting-Based Authentication Using Kinect. NDSS."},{"key":"e_1_3_2_2_36_1","first-page":"321","article-title":"Grid unlock. (Feb. 2 2010)","volume":"12","author":"Timmons Adam T","year":"2010","unstructured":"Adam T Timmons and Osman D Altan 2010. Grid unlock. (Feb. 2 2010). US Patent App. 12\/698,321.","journal-title":"US Patent App."},{"key":"e_1_3_2_2_37_1","volume-title":"Expansion of human-phone interface by sensing structure-borne sound propagation Proceedings of the 14th Annual International Conference on Mobile Systems, Applications, and Services. ACM, 277--289","author":"Tung Yu-Chih","unstructured":"Yu-Chih Tung and Kang G Shin 2016. Expansion of human-phone interface by sensing structure-borne sound propagation Proceedings of the 14th Annual International Conference on Mobile Systems, Applications, and Services. ACM, 277--289."},{"key":"e_1_3_2_2_38_1","volume-title":"Distinguishing users with capacitive touch communication Proceedings of the 18th annual international conference on Mobile computing and networking. ACM, 197--208","author":"Vu Tam","unstructured":"Tam Vu, Akash Baid, Simon Gao, Marco Gruteser, Richard Howard, Janne Lindqvist, Predrag Spasojevic, and Jeffrey Walling 2012. Distinguishing users with capacitive touch communication Proceedings of the 18th annual international conference on Mobile computing and networking. ACM, 197--208."},{"key":"e_1_3_2_2_39_1","doi-asserted-by":"publisher","DOI":"10.1145\/2971648.2971670"},{"key":"e_1_3_2_2_40_1","volume-title":"Acoustic eavesdropping through wireless vibrometry Proceedings of the 21st Annual International Conference on Mobile Computing and Networking. ACM, 130--141","author":"Wei Teng","unstructured":"Teng Wei, Shu Wang, Anfu Zhou, and Xinyu Zhang. 2015. Acoustic eavesdropping through wireless vibrometry Proceedings of the 21st Annual International Conference on Mobile Computing and Networking. ACM, 130--141."},{"key":"e_1_3_2_2_41_1","doi-asserted-by":"crossref","unstructured":"Susan Wiedenbeck Jim Waters Leonardo Sobrado and Jean-Camille Birget 2006. Design and evaluation of a shoulder-surfing resistant graphical password scheme Proceedings of the working conference on Advanced visual interfaces. ACM 177--184.","DOI":"10.1145\/1133265.1133303"},{"key":"e_1_3_2_2_42_1","volume-title":"An efficient user verification system via mouse movements Proceedings of the 18th ACM conference on Computer and communications security. ACM, 139--150","author":"Zheng Nan","unstructured":"Nan Zheng, Aaron Paloski, and Haining Wang 2011. An efficient user verification system via mouse movements Proceedings of the 18th ACM conference on Computer and communications security. ACM, 139--150."},{"key":"e_1_3_2_2_43_1","volume-title":"Networking and Communications (ICNC), 2013 International Conference on. IEEE, 1128--1133","author":"Zhu Jiang","year":"2013","unstructured":"Jiang Zhu, Pang Wu, Xiao Wang, and Joy Zhang. 2013. Sensec: Mobile security through passive sensing. Computing, Networking and Communications (ICNC), 2013 International Conference on. IEEE, 1128--1133."}],"event":{"name":"CCS '17: 2017 ACM SIGSAC Conference on Computer and Communications Security","location":"Dallas Texas USA","acronym":"CCS '17","sponsor":["SIGSAC ACM Special Interest Group on Security, Audit, and Control"]},"container-title":["Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3133956.3133964","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3133956.3133964","content-type":"application\/pdf","content-version":"vor","intended-application":"syndication"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3133956.3133964","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T02:13:26Z","timestamp":1750212806000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3133956.3133964"}},"subtitle":["Towards Finger-input Authentication on Ubiquitous Surfaces via Physical Vibration"],"short-title":[],"issued":{"date-parts":[[2017,10,30]]},"references-count":43,"alternative-id":["10.1145\/3133956.3133964","10.1145\/3133956"],"URL":"https:\/\/doi.org\/10.1145\/3133956.3133964","relation":{},"subject":[],"published":{"date-parts":[[2017,10,30]]},"assertion":[{"value":"2017-10-30","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}