{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T04:34:42Z","timestamp":1750221282810,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":20,"publisher":"ACM","license":[{"start":{"date-parts":[[2017,11,5]],"date-time":"2017-11-05T00:00:00Z","timestamp":1509840000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2017,11,5]]},"DOI":"10.1145\/3144730.3144731","type":"proceedings-article","created":{"date-parts":[[2017,12,27]],"date-time":"2017-12-27T18:57:16Z","timestamp":1514401036000},"page":"1-6","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":6,"title":["Privacy-Preserving Behavioral Authentication on Smartphones"],"prefix":"10.1145","author":[{"given":"Gabriele","family":"Vassallo","sequence":"first","affiliation":[{"name":"imec-DistriNet-KU Leuven, Heverlee, Belgium"}]},{"given":"Tim","family":"Van hamme","sequence":"additional","affiliation":[{"name":"imec-DistriNet-KU Leuven, Heverlee, Belgium"}]},{"given":"Davy","family":"Preuveneers","sequence":"additional","affiliation":[{"name":"imec-DistriNet-KU Leuven, Heverlee, Belgium"}]},{"given":"Wouter","family":"Joosen","sequence":"additional","affiliation":[{"name":"imec-DistriNet-KU Leuven, Heverlee, Belgium"}]}],"member":"320","published-online":{"date-parts":[[2017,11,5]]},"reference":[{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2016.2537748"},{"volume-title":"The MOBIKEY Keystroke Dynamics Password Database: Benchmark Results","author":"Antal Margit","key":"e_1_3_2_1_3_1","unstructured":"Margit Antal and Lehel Nemes . 2016. The MOBIKEY Keystroke Dynamics Password Database: Benchmark Results . Springer International Publishing , Cham , 35--46. Margit Antal and Lehel Nemes. 2016. The MOBIKEY Keystroke Dynamics Password Database: Benchmark Results. Springer International Publishing, Cham, 35--46."},{"key":"e_1_3_2_1_4_1","volume-title":"Proceedings of CSIS Research Day, Pace University","author":"Calix K","year":"2008","unstructured":"K Calix , M Connors , D Levy , H Manzar , G M Cabe , and S Westcott . 2008 . Stylometry for e-mail author identification and authentication . Proceedings of CSIS Research Day, Pace University (2008), 1048--1054. K Calix, M Connors, D Levy, H Manzar, G MCabe, and S Westcott. 2008. Stylometry for e-mail author identification and authentication. Proceedings of CSIS Research Day, Pace University (2008), 1048--1054."},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1109\/PST.2010.5593258"},{"key":"e_1_3_2_1_6_1","volume-title":"Proc. CSIS Research Day","author":"de Oliveira Pedro Xavier","year":"2013","unstructured":"Pedro Xavier de Oliveira , Venugopala Channarayappa , Eamonn O'Donnel , Bappaditya Sinha , Aswinkumar Vadakkencherry , Tushar Londhe , Umesh Gatkal , Ned Bakelman , John V Monaco , and Charles C Tappert . 2013 . Mouse movement biometric system . Proc. CSIS Research Day (2013). Pedro Xavier de Oliveira, Venugopala Channarayappa, Eamonn O'Donnel, Bappaditya Sinha, Aswinkumar Vadakkencherry, Tushar Londhe, Umesh Gatkal, Ned Bakelman, John V Monaco, and Charles C Tappert. 2013. Mouse movement biometric system. Proc. CSIS Research Day (2013)."},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1109\/MITP.2013.50"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICCICT.2015.7045746"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1145\/1085126.1085129"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1145\/1085126.1085129"},{"key":"e_1_3_2_1_12_1","volume-title":"Proceedings of the Eleventh International Conference on Emerging Security Information, Systems and Technologies (SECURWARE","author":"Tim Van","year":"2017","unstructured":"Tim Van hamme, Vera Rimmer , Davy Preuveneers , Wouter Joosen , Mustafa A. Mustafa , Aysajan Abidin , and Enrique Argones R\u00faa . 2017 . Frictionless Authentication Systems: Emerging Trends, Research Challenges and Opportunities . In Proceedings of the Eleventh International Conference on Emerging Security Information, Systems and Technologies (SECURWARE 2017). 1--5 (To appear). Tim Van hamme, Vera Rimmer, Davy Preuveneers, Wouter Joosen, Mustafa A. Mustafa, Aysajan Abidin, and Enrique Argones R\u00faa. 2017. Frictionless Authentication Systems: Emerging Trends, Research Challenges and Opportunities. In Proceedings of the Eleventh International Conference on Emerging Security Information, Systems and Technologies (SECURWARE 2017). 1--5 (To appear)."},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1002\/sec.1061"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.asoc.2010.08.003"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1145\/2379616.2379617"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1109\/IJCB.2011.6117552"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1007\/s11235-011-9538-9"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1002\/sec.776"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2016.03.003"},{"volume-title":"Improving Resilience of Behaviometric Based Continuous Authentication with Multiple Accelerometers","author":"Tim Van","key":"e_1_3_2_1_20_1","unstructured":"Tim Van hamme, Davy Preuveneers , and Wouter Joosen . 2017. Improving Resilience of Behaviometric Based Continuous Authentication with Multiple Accelerometers . Springer International Publishing , Cham , 473--485. Tim Van hamme, Davy Preuveneers, and Wouter Joosen. 2017. Improving Resilience of Behaviometric Based Continuous Authentication with Multiple Accelerometers. Springer International Publishing, Cham, 473--485."},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1504\/IJBM.2008.018665"},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2017.23130"}],"event":{"name":"SenSys '17: The 15th ACM Conference on Embedded Network Sensor Systems","sponsor":["SIGMETRICS ACM Special Interest Group on Measurement and Evaluation","SIGCOMM ACM Special Interest Group on Data Communication","SIGMOBILE ACM Special Interest Group on Mobility of Systems, Users, Data and Computing","SIGOPS ACM Special Interest Group on Operating Systems","SIGBED ACM Special Interest Group on Embedded Systems","SIGARCH ACM Special Interest Group on Computer Architecture"],"location":"Delft Netherlands","acronym":"SenSys '17"},"container-title":["Proceedings of the First International Workshop on Human-centered Sensing, Networking, and Systems"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3144730.3144731","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3144730.3144731","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T02:11:22Z","timestamp":1750212682000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3144730.3144731"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017,11,5]]},"references-count":20,"alternative-id":["10.1145\/3144730.3144731","10.1145\/3144730"],"URL":"https:\/\/doi.org\/10.1145\/3144730.3144731","relation":{},"subject":[],"published":{"date-parts":[[2017,11,5]]},"assertion":[{"value":"2017-11-05","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}