{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,7,20]],"date-time":"2025-07-20T03:58:04Z","timestamp":1752983884801,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":20,"publisher":"ACM","license":[{"start":{"date-parts":[[2020,4,25]],"date-time":"2020-04-25T00:00:00Z","timestamp":1587772800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"name":"DFG","award":["426052422"],"award-info":[{"award-number":["426052422"]}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2020,4,25]]},"DOI":"10.1145\/3334480.3383059","type":"proceedings-article","created":{"date-parts":[[2020,5,28]],"date-time":"2020-05-28T12:52:32Z","timestamp":1590670352000},"page":"1-7","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":10,"title":["Introducing Functional Biometrics: Using Body-Reflections as a Novel Class of Biometric Authentication Systems"],"prefix":"10.1145","author":[{"given":"Jonathan","family":"Liebers","sequence":"first","affiliation":[{"name":"University of Duisburg-Essen, Essen, Germany"}]},{"given":"Stefan","family":"Schneegass","sequence":"additional","affiliation":[{"name":"University of Duisburg-Essen, Essen, Germany"}]}],"member":"320","published-online":{"date-parts":[[2020,4,25]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.14722\/usec.2015.23003"},{"key":"e_1_3_2_1_2_1","volume-title":"Wearable authentication: Trends and opportunities. it-Information Technology 58, 5","author":"Bianchi Andrea","year":"2016","unstructured":"Andrea Bianchi and Ian Oakley. 2016. Wearable authentication: Trends and opportunities. it-Information Technology 58, 5 (2016), 255--262."},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2012.49"},{"volume-title":"The 3rd Annual Global Password Security Report. (2019). https:\/\/www.lastpass.com\/business\/articles\/password-benchmark-report\/thank-you","author":"LogMeIn LastPass","key":"e_1_3_2_1_4_1","unstructured":"LastPass by LogMeIn. 2019. The 3rd Annual Global Password Security Report. (2019). https:\/\/www.lastpass.com\/business\/articles\/password-benchmark-report\/thank-you"},{"key":"e_1_3_2_1_5_1","volume-title":"Proceedings of the Eleventh USENIX Conference on Usable Privacy and Security (SOUPS '15)","author":"Cherapau Ivan","year":"2015","unstructured":"Ivan Cherapau, Ildar Muslukhov, Nalin Asanka, and Konstantin Beznosov. 2015. On the Impact of Touch ID on IPhone Passcodes. In Proceedings of the Eleventh USENIX Conference on Usable Privacy and Security (SOUPS '15). USENIX Association, USA, 257--276."},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2018.2797000"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1515\/icom-2019-0009"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-0--387--71041--9"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.5555\/1855628.1855637"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.imavis.2007.05.004"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1109\/CNS.2016.7860521"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","unstructured":"S\u00e9bastien Marcel Mark S. Nixon Julian Fi\u00e9rrez and Nicholas W. D. Evans (Eds.). 2019. Handbook of Biometric Anti-Spoofing - Presentation Attack Detection Second Edition. Springer. DOI: http:\/\/dx.doi.org\/10.1007\/978--3--319--92627--8","DOI":"10.1007\/978--3--319--92627--8"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1147\/sj.403.0614"},{"volume-title":"2004 12th European Signal Processing Conference. 1221--1224","author":"Ross A.","key":"e_1_3_2_1_14_1","unstructured":"A. Ross and A. K. Jain. 2004. Multimodal biometrics: An overview. In 2004 12th European Signal Processing Conference. 1221--1224."},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1145\/2406367.2406384"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1007\/BF01324126"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.4018\/IJMHCI.2016100106"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1145\/2858036.2858152"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"crossref","unstructured":"Shridatt Sugrim Can Liu Meghan McLean and Janne Lindqvist. 2019. Robust Performance Metrics for Authentication Systems. In NDSS. https:\/\/www.ndss-symposium.org\/ndss-paper\/ robust-performance-metrics-for-authentication-systems\/","DOI":"10.14722\/ndss.2019.23351"},{"key":"e_1_3_2_1_20_1","volume-title":"Twelfth Symposium on Usable Privacy and Security (SOUPS 2016","author":"Wash Rick","year":"2016","unstructured":"Rick Wash, Emilee Rader, Ruthie Berman, and Zac Wellmer. 2016. Understanding Password Choices: How Frequently Entered Passwords Are Re-used across Websites. In Twelfth Symposium on Usable Privacy and Security (SOUPS 2016). USENIX Association, Denver, CO, 175--188. https:\/\/www.usenix.org\/conference\/soups2016\/technical-sessions\/presentation\/wash"}],"event":{"name":"CHI '20: CHI Conference on Human Factors in Computing Systems","sponsor":["SIGCHI ACM Special Interest Group on Computer-Human Interaction"],"location":"Honolulu HI USA","acronym":"CHI '20"},"container-title":["Extended Abstracts of the 2020 CHI Conference on Human Factors in Computing Systems"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3334480.3383059","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3334480.3383059","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T22:33:24Z","timestamp":1750199604000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3334480.3383059"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,4,25]]},"references-count":20,"alternative-id":["10.1145\/3334480.3383059","10.1145\/3334480"],"URL":"https:\/\/doi.org\/10.1145\/3334480.3383059","relation":{},"subject":[],"published":{"date-parts":[[2020,4,25]]},"assertion":[{"value":"2020-04-25","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}