{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,18]],"date-time":"2026-03-18T06:44:19Z","timestamp":1773816259091,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":24,"publisher":"ACM","license":[{"start":{"date-parts":[[2018,8,27]],"date-time":"2018-08-27T00:00:00Z","timestamp":1535328000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"name":"European Union's Horizon 2020 research and innovation programme","award":["653454"],"award-info":[{"award-number":["653454"]}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2018,8,27]]},"DOI":"10.1145\/3230833.3234514","type":"proceedings-article","created":{"date-parts":[[2018,8,13]],"date-time":"2018-08-13T12:29:48Z","timestamp":1534163388000},"page":"1-9","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":9,"title":["Fingerprint Recognition on Mobile Devices"],"prefix":"10.1145","author":[{"given":"Farzaneh","family":"Karegar","sequence":"first","affiliation":[{"name":"Karlstad University, Karlstad, Sweden"}]},{"given":"John S\u00f6ren","family":"Pettersson","sequence":"additional","affiliation":[{"name":"Karlstad University, Karlstad, Sweden"}]},{"given":"Simone","family":"Fischer-H\u00fcbner","sequence":"additional","affiliation":[{"name":"Karlstad University, Karlstad, Sweden"}]}],"member":"320","published-online":{"date-parts":[[2018,8,27]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2017.65"},{"key":"e_1_3_2_1_2_1","volume-title":"Accessed","year":"2018","unstructured":"Apple. 2018 . iOS security, iOS 11. https:\/\/www.apple.com\/business\/docs\/iOS_Securi1y_Guide.pdf. (January 2018) . Accessed April 23, 2018. Apple. 2018. iOS security, iOS 11. https:\/\/www.apple.com\/business\/docs\/iOS_Securi1y_Guide.pdf. (January 2018). Accessed April 23, 2018."},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1080\/00220973.1995.9943797"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.14722\/usec.2015.23003"},{"key":"e_1_3_2_1_5_1","volume-title":"SOUPS","author":"Cherapau Ivan","year":"2015","unstructured":"Ivan Cherapau , Ildar Muslukhov , Nalin Asanka , and Konstantin Beznosov . 2015 . On the impact of Touch ID on iPhone passcodes . In SOUPS 2015. USENIX Association, 257--276. Ivan Cherapau, Ildar Muslukhov, Nalin Asanka, and Konstantin Beznosov. 2015. On the impact of Touch ID on iPhone passcodes. In SOUPS 2015. USENIX Association, 257--276."},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1145\/2702123.2702141"},{"key":"e_1_3_2_1_7_1","volume-title":"Cellwise residual analysis in two-way contingency tables. Educational and psychological measurement 63, 5","author":"Garcia-Perez Miguel A","year":"2003","unstructured":"Miguel A Garcia-Perez and Vicente Nunez-Anton . 2003. Cellwise residual analysis in two-way contingency tables. Educational and psychological measurement 63, 5 ( 2003 ), 825--839. Miguel A Garcia-Perez and Vicente Nunez-Anton. 2003. Cellwise residual analysis in two-way contingency tables. Educational and psychological measurement 63, 5 (2003), 825--839."},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1016\/S0191-8869(99)00244-5"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1145\/2858036.2858267"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1145\/2858036.2858273"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1093\/hwj\/dbp026"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1109\/ARES.2016.79"},{"key":"e_1_3_2_1_13_1","volume-title":"Forensic identification of gender from fingerprints. Analytical chemistry 87, 22","author":"Huynh Crystal","year":"2015","unstructured":"Crystal Huynh , Erica Brunelle , Lenka Hal\u00e1mkov\u00e1 , Juliana Agudelo , and Jan Hal\u00e1mek . 2015. Forensic identification of gender from fingerprints. Analytical chemistry 87, 22 ( 2015 ), 11531--11536. Crystal Huynh, Erica Brunelle, Lenka Hal\u00e1mkov\u00e1, Juliana Agudelo, and Jan Hal\u00e1mek. 2015. Forensic identification of gender from fingerprints. Analytical chemistry 87, 22 (2015), 11531--11536."},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1145\/3098954.3098974"},{"key":"e_1_3_2_1_15_1","volume-title":"John S\u00f6ren Pettersson, and Simone Fischer-H\u00fcbner","author":"Karegar Farzaneh","year":"2018","unstructured":"Farzaneh Karegar , Daniel Lindegren , John S\u00f6ren Pettersson, and Simone Fischer-H\u00fcbner . 2018 . User evaluations of an app interface for cloud-based identity management. In Advances in Information Systems Development, Nearchos Paspallis, Marios Raspopoulos, Chris Barry, Michael Lang, Henry Linger, and Christoph Schneider (Eds.). Springer , 205--223. Farzaneh Karegar, Daniel Lindegren, John S\u00f6ren Pettersson, and Simone Fischer-H\u00fcbner. 2018. User evaluations of an app interface for cloud-based identity management. In Advances in Information Systems Development, Nearchos Paspallis, Marios Raspopoulos, Chris Barry, Michael Lang, Henry Linger, and Christoph Schneider (Eds.). Springer, 205--223."},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1016\/0191-8869(95)00076-I"},{"key":"e_1_3_2_1_17_1","volume-title":"IFIP PrimeLife International Summer School on Privacy and Identity Management for Life","author":"Kindt Els J","unstructured":"Els J Kindt . 2009. The use of privacy enhancing technologies for biometric systems analysed from a legal perspective . In IFIP PrimeLife International Summer School on Privacy and Identity Management for Life . Springer , 134--145. Els J Kindt. 2009. The use of privacy enhancing technologies for biometric systems analysed from a legal perspective. In IFIP PrimeLife International Summer School on Privacy and Identity Management for Life. Springer, 134--145."},{"key":"e_1_3_2_1_18_1","volume-title":"Biometric data, data protection and the right to privacy","author":"Kindt Els J.","unstructured":"Els J. Kindt . 2013. Biometric data, data protection and the right to privacy . Springer Netherlands , Dordrecht , 87--272. Els J. Kindt. 2013. Biometric data, data protection and the right to privacy. Springer Netherlands, Dordrecht, 87--272."},{"key":"e_1_3_2_1_19_1","volume-title":"Biometrics Special Interest Group (BIOSIG), 2013 International Conference of the. IEEE, 1--5.","author":"Krupp Alina","year":"2013","unstructured":"Alina Krupp , Christian Rathgeb , and Christoph Busch . 2013 . Social acceptance of biometric technologies in Germany: A survey . In Biometrics Special Interest Group (BIOSIG), 2013 International Conference of the. IEEE, 1--5. Alina Krupp, Christian Rathgeb, and Christoph Busch. 2013. Social acceptance of biometric technologies in Germany: A survey. In Biometrics Special Interest Group (BIOSIG), 2013 International Conference of the. IEEE, 1--5."},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-85735-8_1"},{"key":"e_1_3_2_1_21_1","volume-title":"Accessed","author":"Source Project Android Open","year":"2018","unstructured":"Android Open Source Project . 2018 . Android Security. https:\/\/source.android.com\/security\/. (March 2018) . Accessed April 23, 2018. Android Open Source Project. 2018. Android Security. https:\/\/source.android.com\/security\/. (March 2018). Accessed April 23, 2018."},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2011.35"},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-58460-7_18"},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1109\/ESPRE.2015.7330160"}],"event":{"name":"ARES 2018: International Conference on Availability, Reliability and Security","location":"Hamburg Germany","acronym":"ARES 2018","sponsor":["Universit\u00e4t Hamburg Universit\u00e4t Hamburg"]},"container-title":["Proceedings of the 13th International Conference on Availability, Reliability and Security"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3230833.3234514","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3230833.3234514","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T02:08:13Z","timestamp":1750212493000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3230833.3234514"}},"subtitle":["Widely Deployed, Rarely Understood"],"short-title":[],"issued":{"date-parts":[[2018,8,27]]},"references-count":24,"alternative-id":["10.1145\/3230833.3234514","10.1145\/3230833"],"URL":"https:\/\/doi.org\/10.1145\/3230833.3234514","relation":{},"subject":[],"published":{"date-parts":[[2018,8,27]]},"assertion":[{"value":"2018-08-27","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}