{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,28]],"date-time":"2026-02-28T00:09:28Z","timestamp":1772237368883,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":31,"publisher":"ACM","license":[{"start":{"date-parts":[[2018,3,13]],"date-time":"2018-03-13T00:00:00Z","timestamp":1520899200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2018,3,13]]},"DOI":"10.1145\/3176258.3176318","type":"proceedings-article","created":{"date-parts":[[2018,3,15]],"date-time":"2018-03-15T13:22:14Z","timestamp":1521120134000},"page":"267-276","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":29,"title":["DIALERAUTH"],"prefix":"10.1145","author":[{"given":"Attaullah","family":"Buriro","sequence":"first","affiliation":[{"name":"University of Trento, Trento, Italy"}]},{"given":"Bruno","family":"Crispo","sequence":"additional","affiliation":[{"name":"University of Trento, Trento, Italy"}]},{"given":"Sandeep","family":"Gupta","sequence":"additional","affiliation":[{"name":"University of Trento, Trento, Italy"}]},{"given":"Filippo","family":"Del Frari","sequence":"additional","affiliation":[{"name":"University of Trento, Trento, Italy"}]}],"member":"320","published-online":{"date-parts":[[2018,3,13]]},"reference":[{"key":"e_1_3_2_1_1_1","unstructured":"Zahid Akhtar. 2012. Security of multimodal biometric systems against spoof attacks. Ph.D. Dissertation. Department of Electrical and Electronic Engineering University of Cagliari Cagliari Italy. Advisor(s) Fabio Roli.  Zahid Akhtar. 2012. Security of multimodal biometric systems against spoof attacks. Ph.D. Dissertation. Department of Electrical and Electronic Engineering University of Cagliari Cagliari Italy. Advisor(s) Fabio Roli."},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1145\/581271.581272"},{"key":"e_1_3_2_1_3_1","unstructured":"Leo Breiman and Adele Cutler. 2018. Random Forests. (2018). Retrieved January 8 2018 from https:\/\/www.stat.berkeley.edu\/~breiman\/RandomForests\/cc_home.htm#features\/  Leo Breiman and Adele Cutler. 2018. Random Forests. (2018). Retrieved January 8 2018 from https:\/\/www.stat.berkeley.edu\/~breiman\/RandomForests\/cc_home.htm#features\/"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"crossref","unstructured":"Attaullah Buriro. 2017. Behavioral Biometrics for Smartphone User Authentication. Ph.D. Dissertation. University of Trento Italy. Advisor(s) Bruno Crispo.  Attaullah Buriro. 2017. Behavioral Biometrics for Smartphone User Authentication. Ph.D. Dissertation. University of Trento Italy. Advisor(s) Bruno Crispo.","DOI":"10.1109\/SPW.2016.20"},{"key":"e_1_3_2_1_5_1","volume-title":"International Conference on Passwords. Springer, 45--61","author":"Buriro Attaullah","year":"2015"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-23222-5_4"},{"key":"e_1_3_2_1_7_1","volume-title":"Hold and Sign: A Novel Behavioral Biometrics for Smartphone User Authentication. In IEEE Security and Privacy Workshops (SPW). 276--285","author":"Buriro Attaullah","year":"2016"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1109\/ISBA.2017.7947684"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"crossref","unstructured":"Attaullah Buriro Sandeep Gupta and Bruno Crispo. 2017. Evaluation of Motionbased Touch-typing Biometrics for online Banking. (2017).  Attaullah Buriro Sandeep Gupta and Bruno Crispo. 2017. Evaluation of Motionbased Touch-typing Biometrics for online Banking. (2017).","DOI":"10.23919\/BIOSIG.2017.8053504"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1145\/2702123.2702141"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1109\/IIHMSP.2010.83"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2012.2225048"},{"key":"e_1_3_2_1_13_1","unstructured":"Hugo Gascon Sebastian Uellenbeck Christopher Wolf and Konrad Rieck. 2014. Continuous Authentication on Mobile Devices by Analysis of Typing Motion Behavior.. In Sicherheit. 1--12.  Hugo Gascon Sebastian Uellenbeck Christopher Wolf and Konrad Rieck. 2014. Continuous Authentication on Mobile Devices by Analysis of Typing Motion Behavior.. In Sicherheit. 1--12."},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-08509-8_6"},{"key":"e_1_3_2_1_15_1","volume-title":"Symposium on usable privacy and security (SOUPS). 213--230","author":"Harbach Marian","year":"2014"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"crossref","unstructured":"Anil Jain Arun A Ross and Karthik Nandakumar. 2011. Introduction to biometrics. Springer Science & Business Media.   Anil Jain Arun A Ross and Karthik Nandakumar. 2011. Introduction to biometrics. Springer Science & Business Media.","DOI":"10.1007\/978-0-387-77326-1"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.5555\/1855628.1855637"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1145\/1869983.1869992"},{"key":"e_1_3_2_1_20_1","volume-title":"International Conference on Information Security and Cryptology. Springer, 331--350","author":"Meng Yuxin","year":"2012"},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1145\/2307636.2307666"},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2017.01.008"},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1109\/IIH-MSP.2012.11"},{"key":"e_1_3_2_1_24_1","first-page":"439","article-title":"A survey of password attacks and comparative analysis on methods for secure authentication","volume":"19","author":"Raza Mudassar","year":"2012","journal-title":"World Applied Sciences Journal"},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1016\/S0167-8655(03)00079-5"},{"key":"e_1_3_2_1_26_1","volume-title":"Hmog: A new biometric modality for continuous authentication of smartphone users. arXiv preprint arXiv 1501","author":"Sitova Zdenka","year":"2015"},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2011.10.001"},{"key":"e_1_3_2_1_28_1","volume-title":"Retrieved","author":"Thirumuruganathan Saravanan","year":"2010"},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.1145\/2420950.2420976"},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10115-007-0114-2"},{"key":"e_1_3_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.1109\/TPAMI.2008.291"},{"key":"e_1_3_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.1109\/WACV.2015.35"}],"event":{"name":"CODASPY '18: Eighth ACM Conference on Data and Application Security and Privacy","location":"Tempe AZ USA","acronym":"CODASPY '18","sponsor":["SIGSAC ACM Special Interest Group on Security, Audit, and Control"]},"container-title":["Proceedings of the Eighth ACM Conference on Data and Application Security and Privacy"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3176258.3176318","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3176258.3176318","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T02:26:40Z","timestamp":1750213600000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3176258.3176318"}},"subtitle":["A Motion-assisted Touch-based Smartphone User Authentication Scheme"],"short-title":[],"issued":{"date-parts":[[2018,3,13]]},"references-count":31,"alternative-id":["10.1145\/3176258.3176318","10.1145\/3176258"],"URL":"https:\/\/doi.org\/10.1145\/3176258.3176318","relation":{},"subject":[],"published":{"date-parts":[[2018,3,13]]},"assertion":[{"value":"2018-03-13","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}