{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,5,13]],"date-time":"2026-05-13T12:49:32Z","timestamp":1778676572830,"version":"3.51.4"},"publisher-location":"New York, NY, USA","reference-count":26,"publisher":"ACM","license":[{"start":{"date-parts":[[2018,5,29]],"date-time":"2018-05-29T00:00:00Z","timestamp":1527552000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2018,5,29]]},"DOI":"10.1145\/3196494.3196543","type":"proceedings-article","created":{"date-parts":[[2018,5,31]],"date-time":"2018-05-31T13:18:28Z","timestamp":1527772708000},"page":"101-115","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":29,"title":["<i>Beat-PIN<\/i>"],"prefix":"10.1145","author":[{"given":"Ben","family":"Hutchins","sequence":"first","affiliation":[{"name":"University of Nevada, Reno, Reno, NV, USA"}]},{"given":"Anudeep","family":"Reddy","sequence":"additional","affiliation":[{"name":"University of Nevada, Reno, Reno, NV, USA"}]},{"given":"Wenqiang","family":"Jin","sequence":"additional","affiliation":[{"name":"University of Nevada, Reno, Reno, NV, USA"}]},{"given":"Michael","family":"Zhou","sequence":"additional","affiliation":[{"name":"University of Nevada, Reno, Reno, NV, USA"}]},{"given":"Ming","family":"Li","sequence":"additional","affiliation":[{"name":"University of Nevada, Reno, Reno, NV, USA"}]},{"given":"Lei","family":"Yang","sequence":"additional","affiliation":[{"name":"University of Nevada, Reno, Reno, USA"}]}],"member":"320","published-online":{"date-parts":[[2018,5,29]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.5555\/1925004.1925009"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2008.25"},{"key":"e_1_3_2_1_3_1","volume-title":"Gesture-Based Continuous Authentication for Wearable Devices: The Smart Glasses Use Case. In International Conference on Applied Cryptography and Network Security. Springer, 648--665","author":"Chauhan Jagmohan","year":"2016","unstructured":"Jagmohan Chauhan , Hassan Jameel Asghar , Anirban Mahanti , and Mohamed Ali Kaafar . 2016 . Gesture-Based Continuous Authentication for Wearable Devices: The Smart Glasses Use Case. In International Conference on Applied Cryptography and Network Security. Springer, 648--665 . Jagmohan Chauhan, Hassan Jameel Asghar, Anirban Mahanti, and Mohamed Ali Kaafar. 2016. Gesture-Based Continuous Authentication for Wearable Devices: The Smart Glasses Use Case. In International Conference on Applied Cryptography and Network Security. Springer, 648--665."},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1145\/2493190.2493213"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2017.61"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"crossref","unstructured":"Se Young Chun Jae-Hwan Kang Hanvit Kim Chungho Lee Ian Oakley and Sung-Phil Kim. 2016. ECG based user authentication for wearable devices using short time Fourier transform Proceedings of IEEE International Conference on Telecommunications and Signal Processing (TSP).  Se Young Chun Jae-Hwan Kang Hanvit Kim Chungho Lee Ian Oakley and Sung-Phil Kim. 2016. ECG based user authentication for wearable devices using short time Fourier transform Proceedings of IEEE International Conference on Telecommunications and Signal Processing (TSP).","DOI":"10.1109\/TSP.2016.7760964"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1108\/09685220310489526"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10207-006-0006-6"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1145\/3025453.3025991"},{"key":"e_1_3_2_1_10_1","volume-title":"Proceedings of International Conference on Mobile Computing, Applications, and Services.","author":"Draffin Benjamin","year":"2013","unstructured":"Benjamin Draffin , Jiang Zhu , and Joy Ying Zhang . 2013 . KeySens: Passive User Authentication through Micro-behavior Modeling of Soft Keyboard Interaction . In Proceedings of International Conference on Mobile Computing, Applications, and Services. Benjamin Draffin, Jiang Zhu, and Joy Ying Zhang. 2013. KeySens: Passive User Authentication through Micro-behavior Modeling of Soft Keyboard Interaction. In Proceedings of International Conference on Mobile Computing, Applications, and Services."},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2012.2225048"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1145\/1455770.1455830"},{"key":"e_1_3_2_1_13_1","volume-title":"Kang Ryoung Park, and Jaihie Kim","author":"Lee Jeong Jun","year":"2004","unstructured":"Jeong Jun Lee , Seungin Noh , Kang Ryoung Park, and Jaihie Kim . 2004 . Iris recognition in wearable computer. In Biometric Authentication. Springer , 475--483. Jeong Jun Lee, Seungin Noh, Kang Ryoung Park, and Jaihie Kim. 2004. Iris recognition in wearable computer. In Biometric Authentication. Springer, 475--483."},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1109\/PERCOM.2016.7456514"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1145\/2047196.2047231"},{"key":"e_1_3_2_1_16_1","volume-title":"Probability","author":"Pitman Jim","year":"1999","unstructured":"Jim Pitman . 1999. Probability . Springer Science & Business Media ( 1999 ). Jim Pitman. 1999. Probability. Springer Science & Business Media (1999)."},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1145\/1030083.1030116"},{"key":"e_1_3_2_1_18_1","volume-title":"Multi-touch Authentication Using Hand Geometry and Behavioral Information Proceedings of IEEE Symposium on Security and Privacy.","author":"Song Yunpeng","year":"2017","unstructured":"Yunpeng Song , Zhongmin Cai , and Zhi-Li Zhang . 2017 . Multi-touch Authentication Using Hand Geometry and Behavioral Information Proceedings of IEEE Symposium on Security and Privacy. Yunpeng Song, Zhongmin Cai, and Zhi-Li Zhang. 2017. Multi-touch Authentication Using Hand Geometry and Behavioral Information Proceedings of IEEE Symposium on Security and Privacy."},{"key":"e_1_3_2_1_19_1","volume-title":"Touchin: Sightless two-factor authentication on multi-touch mobile devices Proceedings on IEEE Conference on Communications and Network Security (CNS).","author":"Sun Jingchao","year":"2014","unstructured":"Jingchao Sun , Rui Zhang , Jinxue Zhang , and Yanchao Zhang . 2014 . Touchin: Sightless two-factor authentication on multi-touch mobile devices Proceedings on IEEE Conference on Communications and Network Security (CNS). Jingchao Sun, Rui Zhang, Jinxue Zhang, and Yanchao Zhang. 2014. Touchin: Sightless two-factor authentication on multi-touch mobile devices Proceedings on IEEE Conference on Communications and Network Security (CNS)."},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1145\/1143120.1143128"},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"crossref","unstructured":"Tianzi Wang Zheng Song Jian Ma Yongping Xiong and Yun Jie. 2013. An anti-fake iris authentication mechanism for smart glasses Proceedings of IEEE International Conference on Consumer Electronics Communications and Networks (CECNet).  Tianzi Wang Zheng Song Jian Ma Yongping Xiong and Yun Jie. 2013. An anti-fake iris authentication mechanism for smart glasses Proceedings of IEEE International Conference on Consumer Electronics Communications and Networks (CECNet).","DOI":"10.1109\/CECNet.2013.6703278"},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1145\/1622176.1622194"},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"crossref","unstructured":"Junshuang Yang Yanyan Li and Mengjun Xie. 2015. MotionAuth: Motion-based authentication for wrist worn smart devices Proceedings of IEEE International Conference on Pervasive Computing and Communication Workshops (PerCom Workshops).  Junshuang Yang Yanyan Li and Mengjun Xie. 2015. MotionAuth: Motion-based authentication for wrist worn smart devices Proceedings of IEEE International Conference on Pervasive Computing and Communication Workshops (PerCom Workshops).","DOI":"10.1109\/PERCOMW.2015.7134097"},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1145\/2858036.2858270"},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"crossref","unstructured":"Yunze Zeng Amit Pande Jindan Zhu and Prasant Mohapatra. 2017. WearIA: Wearable Device Implicit Authentication based on Activity Information Proceedings of IEEE International Symposium on A World of Wireless Mobile and Multimedia Networks (WoWMoM).  Yunze Zeng Amit Pande Jindan Zhu and Prasant Mohapatra. 2017. WearIA: Wearable Device Implicit Authentication based on Activity Information Proceedings of IEEE International Symposium on A World of Wireless Mobile and Multimedia Networks (WoWMoM).","DOI":"10.1109\/WoWMoM.2017.7974305"},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICNP.2014.43"}],"event":{"name":"ASIA CCS '18: ACM Asia Conference on Computer and Communications Security","location":"Incheon Republic of Korea","acronym":"ASIA CCS '18","sponsor":["SIGSAC ACM Special Interest Group on Security, Audit, and Control"]},"container-title":["Proceedings of the 2018 on Asia Conference on Computer and Communications Security"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3196494.3196543","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3196494.3196543","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T01:08:39Z","timestamp":1750208919000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3196494.3196543"}},"subtitle":["A User Authentication Mechanism for Wearable Devices Through Secret Beats"],"short-title":[],"issued":{"date-parts":[[2018,5,29]]},"references-count":26,"alternative-id":["10.1145\/3196494.3196543","10.1145\/3196494"],"URL":"https:\/\/doi.org\/10.1145\/3196494.3196543","relation":{},"subject":[],"published":{"date-parts":[[2018,5,29]]},"assertion":[{"value":"2018-05-29","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}